Question

In: Computer Science

Digital Forensics 1. Many anti-forensic techniques also have purposes which are not for anti-forensics. For each...

Digital Forensics


1. Many anti-forensic techniques also have purposes which are not for anti-forensics. For each of the following, describe the technique and what would be required to show there was intent to destroy or hide evidence.

a. Encryption
b. Defragmentation
c. Drive Wiping

Solutions

Expert Solution

The solution for the problem is provided below, please comment if any doubts:

  1. Encryption
    • Description: Encryption is the encoding of data or secret writing technique. The data is transferred to another form such that only the authorized persons or those who know the encryption credentials can understand the data. There is a encryption algorithm and a key will be there. Both these credentials are required to decrypt the data. Thus the data stored in a device can be keep it in encrypted form so the others will not understand what is it actually.
    • To show there was intent to destroy or hide evidence:
      • The encryption can be used both for security purposes and also to destroy evidence. It is very difficult to detect whether the encryption was for security purposes or to hide evidences.
      • To show that there is an intention to hide evidence, we can rely on the type of encryption. All the encryption techniques are not same and they vary in their nature and implementation.
      • The encryption type used for evidence hiding will be in such a way that, the security will be high and the text can be self destructive by multiple encryption if one tries to crack it. Thus encryption that show high resistance to attack and self destructive encryption suspects the evidence hiding.
  2. Defragmentation:
    • Description: It is the technique to combine the fragments of data that distributed in various parts of the memory to make it meaningful. The fragmentation is a memory management process to enhance the efficiency and security of the data and security.
    • To show there was intent to destroy or hide evidence:
      • Defragmentation is a very technique used in computers for memory management and efficient use of resources.
      • To show that the defragmentation was used for destroy evidence is by collecting defragmented data.
      • Validation of data failure and unsupported file contents can suspect a evidence destroy.
  3. Drive wiping:
    • Description: It is needed to be done to secure the privacy of individuals. If the disk or computer is sell or transfer to someone. Then data wiping is done to wipe all data from the disk.
    • To show there was intent to destroy or hide evidence:
      • It is the most common and easy method to destroy the evidences and it is easy to suspect such an action.
      • If one wipe the disk even if we don’t want to transfer the disk then there should be evidence destroy activity can be suspected.
      • Also when the contents have no privacy related problems but a disk wiping occurs can also suspect a evidence destroy action.

Related Solutions

What is a white-hat-hacker? What is digital forensics? What is anti-forensics?
What is a white-hat-hacker? What is digital forensics? What is anti-forensics?
A2Z Forensics is a digital forensics investigation firm that conducts forensic investigations for public as well...
A2Z Forensics is a digital forensics investigation firm that conducts forensic investigations for public as well as private sectors. You are working in this firm as a forensics specialist for a number of years now. The firm is establishing a new forensics lab to meet the future requirements. You have been asked to prepare a business case for this new lab. Your job is to focus on three aspects of the new lab which are hardware, software and lab security....
Digital Forensics In detail, explain the Window’s registry. Describe its structure, its purpose, and how forensic...
Digital Forensics In detail, explain the Window’s registry. Describe its structure, its purpose, and how forensic examiners can use it in a case. In addition, describe what metadata is and how it relates to digital forensics.
DIGITAL FORENSIC TOOKS: 1. USB FORENSIC What value could this artifact have for investigation? What kinds...
DIGITAL FORENSIC TOOKS: 1. USB FORENSIC What value could this artifact have for investigation? What kinds of information can you extract? 2. WINDOWS REGISTRY What value could this artifact have for investigation? What kinds of information can you extract? What were they following originally designed for What kind of forensic value could they provide in the in a digital investigation? What are some of the limitations of each type of the artifact? Link Files Prefetch ShimCache Shellbags Jump lists VSS...
Digital Forensics, Describe in your own language, at least 200 words for each question 1/Explain the...
Digital Forensics, Describe in your own language, at least 200 words for each question 1/Explain the Fourth Amendment and its impact on Digital Forensics 2/Define the Electronic Communication Privacy Act 3/Describe email protocols.
Digital Forensics, At least 200 words for each question 1/ Research a network attack (DDoS, Man-in-the-Middle,...
Digital Forensics, At least 200 words for each question 1/ Research a network attack (DDoS, Man-in-the-Middle, IP Spoofing, etc.) and explain it in further detail. 2/ Discuss ways that forensic examiners have been able to identify and analyze these attacks. 3/ Find an attack , where an examiner was able to successfully identify the attacker, and explain techniques used to do so.
1. what is the timeline of cyber or digital forensics up till date 2. with a...
1. what is the timeline of cyber or digital forensics up till date 2. with a case scenario discuss the chain of custody principle in digital or cyber forensics 3. Discuss, compare and contrast the existing hatching algorithms
1. Imagine a world where everyone payments are digital, what purposes would we have for cash?...
1. Imagine a world where everyone payments are digital, what purposes would we have for cash? (a) Give as many reasons as you can why people would still hold cash (b) What percentage of their income would you guess people would hold as cash, on average? (c) What effect would this have on the money multiplier?
What new opportunities does integrating forensic accounting techniques with the internal control system have in providing...
What new opportunities does integrating forensic accounting techniques with the internal control system have in providing an effective mechanism for developing a fraud risk management strategy? (300 words)
How many kinds of anti-dumping measures exist according to the WTO Anti-Dumping Agreement? Define briefly each...
How many kinds of anti-dumping measures exist according to the WTO Anti-Dumping Agreement? Define briefly each of them.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT