Your Perfect Assignment is Just a Click Away

We Write Custom Academic Papers

100% Original, Plagiarism Free, Customized to your instructions!

glass
pen
clip
papers
heaphones

AIU Computer Forensics Image & Title Recovery Programs Discussion

AIU Computer Forensics Image & Title Recovery Programs Discussion

Question Description

I’m working on a computer science discussion question and need an explanation to help me understand better.

Write a Response for the following Discussion Board question?

Computer Forensics’ Image Analysis

It is my understanding that computer forensics’ image analysis, which is also known as “computer vision” or “image recognition.,” is the process of identifying characteristics within an image using digital image processing techniques which ensures that the process is accurate, and images have not been compromised. The process is conducted for the purpose of examining common areas on the disk image for possible malware, hidden images, violations of company policies, and any other evidence of a crime. The potential evidence is identified can be further analyzed to determine the cause and establish the timeline of the crime occurrences (Prasad, n.d.). Some of the tools that can be used for image analysis are Disk imaging software, hashing tools, file recovery programs, software and hardware write tools, and Encase (6 Top computer forensic tools, 2009).

The Best Tool to Use for This Investigation

The tool that I would use to conduct an Image Analysis for this investigation is the Encase. I would choose this tool Encase because it is one of the most widely used commercial computer forensic tool made by Guidance Software. I would various investigative tasks can perform with Encase such as disk imaging and verification and analysis of data. Some digital evidence many have unallocated spaces which may contain valuable information in context with a cyber-crime investigation. With Encase, it is possible to inspect these unallocated spaces and collect the necessary data (6 Top computer forensic tools, 2009).

Benefits and Disadvantages of Using Encase

The benefits of using Encase is that it can break down complex file structures for examination, such as the registry files, dbx & pst files, thumbs db etc, it has timeLine, and full scripting abilities. It also allows automation of report, decryption, and carving. I would choose Encase over some of the other tools because it has a built-in mechanism for breaking down complex file structures so that they can be analyzed and investigated. It also only needs to be hashed once. Some of the Disadvantages of Using Encase are it has No progress bar, no multi-tasking, no scripting support, HFS (mac) not support, a 2 million file limit, no PSD or AVI support, requires a lot of work, has rough looking reports, no internal mail viewer, no full Indexing of the Drive, and only performs live searches (Atom, 2011). However, EnCase supports the detection and processing of multiple email mailbox formats, including EDB (Microsoft Exchange), DBX (Outlook Express) and even Unix-style MBOX files.

References

Atom. (2011, April 7). Advantages and Disadvantages of FTK and EnCase. Retrieved

from http://acid-burninfo.blogspot.com/2011/04/sadvantages-and-disadvantages-of-ftk.html

Nelson, B., Phillips, A., & Steuart, C. (2019). Guide to computer forensics and investigations (5th

ed.). Boston, MA: Cengage.

Prasad, R. (n.d.). Forensic analysis of digital media – 4 methods explained https://www.ci.security/resources/news/article/forensic-analysis-of-digital-media-4-methods-explained.

6 Top computer forensic tools. (2009, December 21).

https://www.ci.security/resources/news/article/forensic-analysis-of-digital-media-4-methods-explained

Order Solution Now

Our Service Charter

1. Professional & Expert Writers: Gold Grades only hire the best. Our writers are specially selected and recruited, after which they undergo further training to perfect their skills for specialization purposes. Moreover, our writers are holders of masters and Ph.D. degrees. They have impressive academic records, besides being native English speakers.

2. Top Quality Papers: Our customers are always guaranteed papers that exceed their expectations. All our writers have +5 years of experience. This implies that all papers are written by individuals who are experts in their fields. In addition, the quality team reviews all the papers before sending them to the customers.

3. Plagiarism-Free Papers: All papers provided by Gold Grades are written from scratch. Appropriate referencing and citation of key information are followed. Plagiarism checkers are used by the Quality assurance team and our editors just to double-check that there are no instances of plagiarism.

4. Timely Delivery: Time wasted is equivalent to a failed dedication and commitment. Gold Grades is known for timely delivery of any pending customer orders. Customers are well informed of the progress of their papers to ensure they keep track of what the writer is providing before the final draft is sent for grading.

5. Affordable Prices: Our prices are fairly structured to fit all groups. Any customer willing to place their assignments with us can do so at very affordable prices. In addition, our customers enjoy regular discounts and bonuses.

6. 24/7 Customer Support: At Gold Grades, we have put in place a team of experts who answer all customer inquiries promptly. The best part is the ever-availability of the team. Customers can make inquiries anytime.