Question

In: Computer Science

1. The development of a forensic lab for computers and mobile devices involves numerous specialized tools....

1. The development of a forensic lab for computers and mobile devices involves numerous specialized tools. Describe both hardware and software tools that might be utilized in such a lab.
2. Select ONE type of software tool from the list below. Using the internet or online library, find an article, case study, or publication about computer forensics that addresses the specific software tool you chose.
1) Device Seizure by Paraben
2) ForensicSIM by Evidence Talks
3) USIMdetective by Quantaq Solutions
4) SIMCON by Inside Out Forensics
5) .XRY by Micro Systemation 6) MOBILedit! Forensic by Compelson Laboratories

Solutions

Expert Solution

Well there are various number of tools available for computer and mobiles. Here we have a hardware tool of mobile called cellebrite ufed touch 2 is mostly used in field conditions.And there are divided into two parts one is branded tablet cellebrite ufed touch 2 this analogue software is connected to one of the analysts laptop and with this we can perform data extraction. And the second one is ufed physical analyser with this we can analyse the data that we extracted.

Now the software of the mobile that we are going to discuss is that oxygen software . Earlier we don't have much tools to access the phones emails, gps location data etc but with this software we can access texts, emails , deleted texts and gps location data also . To make this work we will be having certain program s too.

Now coming to the computer hardware the tableau t35u it is called as the writer blocker which is connected to the hard drives of the inspected computer via the bus of usb3 it generally performs the write and read operations and very useful for hard drive examination which contains malicious software and another one is wiebitech forensic dock ultra v5 this one does the same work but it can also dig the data which is kept hidden.

Next one is the software of the computer is called belkasoft evidence center which set it own path for extracting cloud data , emails , hard drive data and it can also detect the encrypted partitions and files and can also access the data from webs and payment details system logs and deleted data also . There were many softwares before this but none of them have had this much uses.


Related Solutions

Do you consider computers and mobile devices to be harmful to your health? why or why...
Do you consider computers and mobile devices to be harmful to your health? why or why not?   Would you change your electronic device usage or rearrange your computer work area to minimize your risk?   Why? or why not?   What modifications can you make?
Question 1 Notex Manufacturing makes various batteries used in mobile devices. The company has a major...
Question 1 Notex Manufacturing makes various batteries used in mobile devices. The company has a major customer so batteries are shipped in bulk to this customer. The company also distributes these batteries to retail stores as replacement parts. The batteries are packaged individually to retail stores. In all, the company makes about 15 different batteries. Currently, the company does not use any forecasting to predict the demand for the batteries. Instead, it has employed rule of thumb to decide about...
SN2 Pre-lab questions 1. Note that the general mechanism for an SN2 reaction involves stereochemistry. What...
SN2 Pre-lab questions 1. Note that the general mechanism for an SN2 reaction involves stereochemistry. What happens to the substrate’s stereochemistry during an SN2 reaction? 2. How might steric hinderance in the substrates play a role in stabilizing or destabilizing the transition state? (hint: sp2 hybridized carbons sterically prevent nucleophilic attack.) How readily do you predict the reactants in our experiment will react in the SN2 reaction? Form a table for the SN2 reactions described in Today’s Experiment below, consisting...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT