Case Study #3 The main goal of a computer forensic investigator is to conduct investigations through the application of evidence gathered from digital data. As a forensic investigator, it’s important to have a strong understanding of the different types of evidence that maybe encountered and the appropriate steps for retrieving and preserving it. The information that is collected during an investigation is extremely fragile and must be properly processed. In order to accomplish this, forensic…
and hard disk storage. Magnetic tape became more popular because it was cheaper to produce and more reliable comparing to the hard disk at the time. One big draw back for the magnetic storage was it is slow and the data reading is sequential which means the computer cannot skip to access a certain piece of data. Magnetic disk technology developed into many forms, a popular one was the floppy disk that came in different sizes and storage capacities. In the 1990s, the invention of optical disk…
Sentil Kumar from the studio took the damaged hard disk that had all the files to at least 4 - 5 local vendors for photos and video recovery. However, none of them was able to recover the lost data. They explained that the hard disk was extremely damaged and so the data recovery process could not be performed. Even if tried, it would not render and useful data. One of the local vendors…
your computer. If users do not use virus protection on their computer (e.g. McAfee) they will have to spend a lot of money by replacing their hard drive on a monthly basis to prevent their computer system from failing on them. Not only does virus protection save a lot of money, it also saves the user a lot of time if they were to keep replacing the hard drive to remove infected files. As this method saves the user a lot of money, it will also improve their system performance and with the money…
these tools will be used to complete a bit-stream backup that will be performed on the device. Once the drive is backed up, the drive information will then be saved on write optical disks & began a case file. Two back up disks will be created for in case something were to happen to one of them. Sometimes it can be difficult completing the backups due to the age of the system, format of the drive, double spaced, & new high capacity devices, & if the devices are MaCintosh. Evidence extraction is…
It is a piece of code which is loaded onto the computer without the user knowledge and runs itself. When this code is executed, it makes a copy of itself and inserts this copy into another computer programs, data files of the hard drive. Such small virus also steals hard disk space and CPU time , corrupts data. This is dangerous because it will make use of available memory and brings system to halt. Brain Virus: Brain virus is the first computer virus which was released in January…
It makes sure that it can handle all of the data being stored on it. It then makes the hard disk visible to an operating system. The third step is to then make a new file system, that can be used to store the data on the hard disk. Task 4 Task 4 Item name Why Daniel needs this item in his computer specification? Description, photo, price How will this item meet his needs? I5 quad core processor Daniel needs…
great deals are found, the part should be purchased. There are new deals every week, especially on Newegg and Amazon, for computer parts. The main parts for a computer are the power supply, motherboard, processor with integrated graphics, hard drive or solid state drive, fans, and…
for disk drives. It can support up to 8 devices or 16 devices with a wide SCSI. The use can have a n SCSI adapter expansion card with either an internal or external connection. After this adapter has been installed, this will then allow more than multiple SCSI devices to be installed within the computer. This was mainly designed for apple but can be used for computers but many have switched to SATA drives. SCSI is a fast bus on the computer and can connect many of devices such as hard drives,…
In this modern age of information gathering and retrieval, the thought of how and to the extent we can store information has always been an issue of paramount concern. For while libraries, hard drives, and floppy disks served their purpose in bygone times, the amount of information we have today, along with the prodigious rate it is still growing, have made them , while not necessarily obsolete, insufficient for the task. This is why the most promising method of storage in the current time is…