LECTURER/TUTOR: DR. TONY DE-SOUZA DAW
Mahmud Khansur
[Type the author name]
Table of Contents
Outline & Introduction 3
Researched Explanations 3
Application of Anti-Forensic Techniques : 5
Deleting Files (Student ID & Movie Name) 5
Encryption&Steganography 8
Deleting Files (Picture) 14
Evaluations, Recommendations& Conclusion 18
References 19
Outline & Introduction
People who try to steal or seek other people 's personal information is growing rapidly in today 's society. Before we know it, a certain person may have access to your bank account ; before you know that your account is empty. You can access your e -mails ; before you know it your account will be hacked. Social networks to mobile phones ; People can even hide some things in images if they can certainly not be accessed. While we may delete files from our computer system, it does not leave your system immediately. Yes, it was removed but it is still floating around on your hard drive , making it easy for someone to easily recover the deleted file . This will include some different amount of information about how we can access hidden information , delete, copy information and hide some things in many ways . There will be discussions , explanations, tips, definitions and analytical critical information we need to know ; also accompanied by numerous screen shots of the work . Programs like Winhex , ProDiscover basic and SilentEye also play a monumental role in the report. Regarding the report , it will be in charge of anti- forensic techniques such as data hiding , wiping secure , encryption, file deletion, steganography and much more . After everything is done , then it will need a picture of the USB , so it can be further improved and used for activities and future tasks.
Researched Explanations
There are different types of anti - Forensic experts and the following definitions described below , research areas , etc.,
References: “What is encryption and why is it important?”Espionage App. 2013. Retrieved 27 April 2014 fromhttp://www.espionageapp.com/EspionageHelp/pages/faq-encryption.html “Data wiping.” 2013. Retrieved 27 April 2014 from http://www.z-a-recovery.com/ref-wipe.htm Zeaks, N.”PCI DSS Glossary.” 2012. Retrieved 28 April from http://pcibytti.com/pci-dss/pci-glossary/#S “Data Hiding.” Janalta Interactive Inc. 2014. Retrieved 28 April fromhttp://www.techopedia.com/definition/14738/data-hiding “Computer Forensics: Recovering Deleted Files With Encase. whereisyourdata. Unknown Year. Retrieved 29 April from http://www.youtube.com/watch?v=33HS50gQOEQ