Question

In: Computer Science

1. Define NTFS alternate data stream( 1 Marks). What is the Significance of whole disk encryption...

1. Define NTFS alternate data stream( 1 Marks).

What is the Significance of whole disk encryption and challenges it poses in digital forensics investigations?Total

Solutions

Expert Solution

Answer)

The file attributes which are found on the NTFS file system are otherwise called as Alternate Data Stream or ADS

This has many attributes wherein $Data is one such attribute which has a regular data stream of the text file and it contains the text inside the text file which is the primary data stream.

This is mostly called the unnamed data stream as the name string of the attribute is empty and the data stream which has the name is considered an alternate.

The significance of FDE or the whole disk encryption is that it would help in encrypting the data present in the disk drive which would have the programs that can encrypt the OS partition. This is done by performing the disk encryption of the software or the hardware which has been installed to the drive while the manufacturing or with regards to the additional software driver. This helps in converting the device data as a form for understanding the key to decrypt the encrypted data. This helps in preventing any unauthorized data access.

The challenges associated with it in digital forensic investigations are as follows:

  • It prevents the data from recovering any digital evidence from that of the computer
  • A forensic examiner cannot access the data after the computer is shut down as the strong encryption will not allow one to access without a key or passphrase, hence it has to perform the live forensic acquisition.
  • There are other techniques which can be used for recovering the evidence else it becomes inaccessible.

Hope this answer helps.
If you find this answer useful, do hit like.
Thanks


Related Solutions

Discuss whole disk encryption and its impact on the DF field. What can you do to...
Discuss whole disk encryption and its impact on the DF field. What can you do to counteract WDE?
What is an Alternate Data Stream? How is time stomping performed? What is the command to...
What is an Alternate Data Stream? How is time stomping performed? What is the command to display an ADS from the command line? How do you encrypt a file using the EFS feature of NTFS? What is the byte range for in decimal for the first partition? What number indicated that a partition is bootable? What does LBA stand for and what does it do? The Master Boot Record ends with what signature? Please answer this question in an easy...
What are the typical null and alternate hypotheses for a significance test on slope?
What are the typical null and alternate hypotheses for a significance test on slope?
What is the weakness about using the same key stream multiple times for encryption in a...
What is the weakness about using the same key stream multiple times for encryption in a stream cipher? How can it be solved in practice?
1. Define what a knowledge worker is and discuss the significance of the knowledge worker in...
1. Define what a knowledge worker is and discuss the significance of the knowledge worker in today’s business world . 2. Define and differentiate between the terms information and data. 3. What is the relationship between problem solving and decision making?
1. Define what a knowledge worker is and discuss the significance of the knowledge worker in...
1. Define what a knowledge worker is and discuss the significance of the knowledge worker in today’s business world. 2. Define and differentiate between the terms information and data. 3. What is the relationship between problem solving and decision making? 4. What role can Excel play in decision making? 5. Describe a time you have performed a what-if analysis. 6. Describe a situation in which having access to large amounts of information had a negative impact on your decision making....
For encryption, what does it mean for data to be in transition and in use? What...
For encryption, what does it mean for data to be in transition and in use? What are the major security concerns with data encryption?
2. (8 marks) In a model of dynamic increasing returns, illustrate an alternate scenario to what...
2. In a model of dynamic increasing returns, illustrate an alternate scenario to what we discussed in class and briefly explain using words. In this scenario, France protects its cotton industry with a temporary blockade, but after the blockade ends the protection is not enough for France to retain an advantage in cotton production, and once UK cotton is no longer blockaded, that the UK will recover its initial advantage. Be sure to draw and label any necessary learning curves...
What is transparent data encryption. what problem's does itresolve and What are the limits of...
What is transparent data encryption. what problem's does it resolve and What are the limits of TDE encryption?
What is the advantage of having smaller regions for data encryption on a CD or DVD?
What is the advantage of having smaller regions for data encryption on a CD or DVD?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT