Preview

Computer forensics

Better Essays
Open Document
Open Document
2184 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Computer forensics
COMPUTER FORENSICS
LECTURER/TUTOR: DR. TONY DE-SOUZA DAW

Mahmud Khansur
[Type the author name]

Table of Contents
Outline & Introduction 3
Researched Explanations 3
Application of Anti-Forensic Techniques : 5
Deleting Files (Student ID & Movie Name) 5
Encryption&Steganography 8
Deleting Files (Picture) 14
Evaluations, Recommendations& Conclusion 18
References 19

Outline & Introduction

People who try to steal or seek other people 's personal information is growing rapidly in today 's society. Before we know it, a certain person may have access to your bank account ; before you know that your account is empty. You can access your e -mails ; before you know it your account will be hacked. Social networks to mobile phones ; People can even hide some things in images if they can certainly not be accessed. While we may delete files from our computer system, it does not leave your system immediately. Yes, it was removed but it is still floating around on your hard drive , making it easy for someone to easily recover the deleted file . This will include some different amount of information about how we can access hidden information , delete, copy information and hide some things in many ways . There will be discussions , explanations, tips, definitions and analytical critical information we need to know ; also accompanied by numerous screen shots of the work . Programs like Winhex , ProDiscover basic and SilentEye also play a monumental role in the report. Regarding the report , it will be in charge of anti- forensic techniques such as data hiding , wiping secure , encryption, file deletion, steganography and much more . After everything is done , then it will need a picture of the USB , so it can be further improved and used for activities and future tasks.

Researched Explanations

There are different types of anti - Forensic experts and the following definitions described below , research areas , etc.,



References: “What is encryption and why is it important?”Espionage App. 2013. Retrieved 27 April 2014 fromhttp://www.espionageapp.com/EspionageHelp/pages/faq-encryption.html “Data wiping.” 2013. Retrieved 27 April 2014 from http://www.z-a-recovery.com/ref-wipe.htm Zeaks, N.”PCI DSS Glossary.” 2012. Retrieved 28 April from http://pcibytti.com/pci-dss/pci-glossary/#S “Data Hiding.” Janalta Interactive Inc. 2014. Retrieved 28 April fromhttp://www.techopedia.com/definition/14738/data-hiding “Computer Forensics: Recovering Deleted Files With Encase. whereisyourdata. Unknown Year. Retrieved 29 April from http://www.youtube.com/watch?v=33HS50gQOEQ

You May Also Find These Documents Helpful

  • Powerful Essays

    272. Newman, R. (2007). Computer Forensics: Evidence Collection and Managment. Boca Raton FL: Taylor & Francis Group. LLC.…

    • 4846 Words
    • 17 Pages
    Powerful Essays
  • Good Essays

    6.07 Forensics

    • 287 Words
    • 2 Pages

    2. It is important because it is society that scientists can out together, they have what they need.…

    • 287 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Forensics2E Lab02 AW

    • 256 Words
    • 2 Pages

    1. Why is the unallocated space of a Windows system so important to a forensic…

    • 256 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Cis 417 Assignment 1

    • 755 Words
    • 4 Pages

    There are many challenges for a computer forensics specialist and everyone faces the same challenges. There first challenge is to find a way to examine an increasing number of digital devices, each containing an immense volume of data, in a timely manner with limited resources (Charles L Cohen, n.d.). Another challenge is the fact that offenders are finding easier ways to store data. They…

    • 755 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Lab 1

    • 414 Words
    • 2 Pages

    2. Which items within WinAudit’s initial report would you consider to be of critical importance in a computer forensic investigation?…

    • 414 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    forensics

    • 449 Words
    • 2 Pages

    What physical evidence did you find at the victim’s home? A box of matches, a space heater, beer bottles, Natalie’s wallet, a V-shaped burn pattern, burned outlet, a protected surface on the ground, crazed glass, and a puddle-shaped burn pattern.…

    • 449 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    The information in this paper will investigate the elements involved in computer security. Protecting information today requires more than just locking a door or filing cabinet. With data being stored electronically, it is vital that important information be protected from prying eyes. There are many different methods for protecting information that is stored on computers. These methods include everything from password and usernames to biometric devices. There are also software solutions that are used, including antivirus and anti-malware software along with firewalls. All of this is to accomplish the desired…

    • 1544 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    Sometimes there can be a sudden requirement to perform hard drive forensic examination. The goals of your forensic examination can be related to virtually any subject, since any type of case/action can take place. Sometimes many instances you may not always perform a full-scale investigation or “fishing expedition” when reviewing the contents of media; in other words, your forensic examination of media may include criteria that focuses and narrows your examination.…

    • 140 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    After the preservation phase, forensics are required to locate and identify any evidence that can be used to aid the crime case. There are several locations where evidence are usually found such as in the hard drive on the user’s personal computer, laptop, smart phone or tablet (ACPO, 2012). It is also critical that forensics are aware of the intention of the particular investigation. This aids in the forensics' efforts of locating digital evidences that are relevant to the case. For example, in the case of a server intrusion, forensics should look out for signs such as a rootkit installation, analyze configuration files, logs files and etc. These are possible locations and processes where traces of evidence can be picked out from (Carrier and Spafford, 2003).…

    • 257 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Forensic evidence is a type or forensic science, which is a science applied to answering legal questions. This evidence can draw together knowledge from a single field, or it could be a combination of fields. Whatever the field may be, the evidence is applied and used to help reconstruct a crime case. There is also a branch called Criminalistics, which deals with the examination…

    • 226 Words
    • 1 Page
    Good Essays
  • Satisfactory Essays

    Forensic Science is the examination of criminal evidence for the criminal justice system in order to successfully prosecute a criminal.…

    • 479 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Computer crime is an ongoing issue that we continuously see, and a major problem with this is that most people do not realize the harm that computer crime can cause. Computer crime is also a niche that continues to grow. This is based on the fact that there are many different perceptions about what computer crime is, and the harmful effects it can have. Because there is a gap between traditional views of what cyber crime is and the actual realities of these crimes, it is a criminal offense that will continue to happen.…

    • 1102 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Digital Forensics Paper

    • 1176 Words
    • 5 Pages

    It can be argued at times that from an economic standpoint that digital forensic analysis can be valued when it saves the companies millions of dollars by ensuring their network is not intruded, however it certainly is not valued oftentimes on the individual level. The criminal side of digital forensics can be quite disturbing, especially when dealing with sensitive topics such as, child pornography. Although it can be quite gratifying for individuals to know they took part in capturing a sexual predator, oftentimes, as observed by Irvine (n.d.), a burnout issue among digital forensic practitioners is more present (As cited in, Losavio, Seigfried-Spellar, and Sloan, 2016). The value in which individuals derive rom the practice of digital forensics if most definitely lower as it can often be viewed as less gratifying as individuals become more sensitive to digital content over long periods of…

    • 1176 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Encase

    • 680 Words
    • 3 Pages

    EnCase is a powerful network enable, multiplatform enterprise investigation platform. It enables immediate response to any computer related incidents and enables thorough forensic analysis. It also preserves volatile and static data on servers, workstations and laptops on and off the corporate network without disrupting operations. Without EnCase organizations must resort to inefficient manual processes using stand alone utilities that extend the response and investigation process by days or weeks and require target systems to be taken out of service. EnCase brings industry standard, law-enforcement grade computer forensic technology to the enterprise for unprecedented incident response and investigative capability. Information security professionals, investigators, auditors and incident response teams can reach any computer within the enterprise in seconds to perform any type of digital investigation. An immediate response is critical to maintaining network and application uptime and reducing the impact of incidents or attacks occurring internally or externally. This translates to anytime, anywhere response and investigative capabilities for information security professionals, computer incident response teams and forensic examiners. EnCase is revolutionizing the practice of enterprise and computer investigations by providing immediate response and thorough analysis of servers, workstations and laptops anywhere on or off the corporate network. Some features from EnCase are : Securely investigate/analyze many machines simultaneously over the LAN/WAN at the disk and memory level, acquire data in a forensically sound manner, using software that has an unparalleled record in courts worldwide, limit incident impact and eliminate system downtime with immediate response capabilities, investigate and analyze multiple platforms Windows, Linux, AIX, OS X, Solaris using a single tool, efficiently collect only…

    • 680 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Forensic Anthropology

    • 942 Words
    • 4 Pages

    The first form of communication a forensic anthropologist receives usually comes from law enforcement officers. Forensic anthropologists do not only work for the prosecution, and, likewise, they are not solely involved in criminal cases. They are more of so like the CSI, but work mainly with remains of humans. Forensic anthropologists often work with the defense in criminal cases. Forensic anthropologists should be willing to answer questions as they arise, regardless of what side they would want to be or support. Forensic anthropologists are called to…

    • 942 Words
    • 4 Pages
    Good Essays