Question
In this lesson, you explored the basic principles of computer forensics, and the processes that are a part of systems forensics, investigations, and response. You
In this lesson, you explored the basic principles of computer forensics, and the processes that are a part of systems forensics, investigations, and response. You also learned that the ability to formulate a rationale, or reasoning, behind computer forensic activities that can be understood by lay persons in a court is a critical competency for computer forensic specialists.
In this lab, you will you will act as a forensic specialist assisting the lead forensics investigator at the Cyber Crimes Division (CCD) for the City of Fremont Police Department. You have been given a hard drive image taken from a seized computer suspected of containing stolen credit card numbers. You will review the search warrant and complete the chain of custody form that accompanies the evidence drive. Using a variety of forensic tools, you will prepare the contents of the seized hard drive image as evidence, in accordance with the Daubert standard. For example, you will use FTK Imager to create hashes for key evidence files. You will also validate the hash code using EnCase Imager and P2 Commander.
1. How do you generate a hash file in FTK Imager?
2. What was the MD5 hash value in 043458.csv, the deleted e-mail file?
3. What is the Daubert standard?
4. Why must a forensic investigator be familiar with emerging technologies?
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started