Question

Case Project 14-5: Forensics Tools Search the Internet for websites that advertise computer forensic tools. Locate reviews of
0 0
Add a comment Improve this question Transcribed image text
Answer #1

ANS: I used to search internet resources for finding Computer forensic Tools using for fraud detection and digital security applications along with retrieval of Digital evidence in Criminology as a court of evidence from Hard drives/Smart Phones/mail boxes or social media accounts in cyber threat cases and concluded the following four tools with Data Search,Features etc

Forensic Tool Name

Data Searched

Advantages

Limitations

Cost

Encase

1. EnCase is an item which has been intended for legal sciences, advanced security, security examination, and e-disclosure use.

2.Encase is usually used to recover verification from held onto hard drives.

3.Encase empowers the pro to guide a start to finish examination of customer records to assemble advanced proof can be utilized in an official courtroom.

· 1.It is a very user friendly tool. Encase wins the race here as well by supporting the analyst with user friendly interface.

· 2.With the paid version of Encase which supports all utilities, it also has a free version which can be used for evidence acquisition which is very easy to use. This tool is known as the Encase Imager.

· 3.In terms of processing and analysis features, this tool also has good reporting functionalities built into it.

· 4.With the increase in cyber threats, encryption plays a significant role in securing data in any type or kind of system. Encase has built in support for almost all types of encryption including Bitlocker, MacAfee, Symantec, Sophos etc.

· 5.Good keyword searching capabilities and scripting features are available.

·

· 1.This is an over the top expensive device.

·

· 2.Encase handling can take a great deal of time if there should arise an occurrence of exceptionally enormous compound documents and letter drops.

·

· 3.The most recent forms of Encase once in a while are not perfect with other criminological based devices.

·

· 4.There is a lot of utilization of Encase for portable legal sciences.

Expensive but Free Version also available

Forensic Tool Kit

1.The Forensic Toolkit, or FTK, is a PC legal examination programming bundle made by AccessData.

2.It inspects a hard drive via looking for changed data.

3.It can, for example, find erased messages and can likewise check the plate for content strings.

4 These would then be able to be utilized as a mystery catchphrase reference to break any encryption.

5.The tool compartment consolidates a free circle imaging program called the FTK Imager.

6.It spares a picture of a hard plate in one archive or in various portions which would then be able to be reproduced later.

6.It registers MD5 hash esteems and certifies the respectability of the data before shutting of the records. The result is a picture file(s) that can be spared in a few configurations.

· 1.It has a straightforward UI and progressed looking through capacities.

·

· 2.FTK underpins EFS unscrambling.

·

· 3.It creates a case log record.

·

· 4.It has noteworthy bookmarking and striking announcing highlights.

·

· 5.FTK Imager is free.

· 1.FTK doesn't bolster scripting highlights.

·

· 2.It doesn't have performing multiple tasks capacities.

·

· 3.There is no advancement bar to assess the time remaining.

·

· 4.FTK doesn't have a course of events see.

Paid Version only available

XWF(X-Ways)

1.X Ways Forensics is an amazing, business Computer Forensic Tool.

2.It is a Windows based authorized programming which offers numerous functionalities relating to PC crime scene investigation.

3.Perhaps the best bit of leeway of this product is that it very well may be utilized in a compact mode.

· 1.Proof preparing alternatives can be modified according to the prerequisites of the case.

·

· 2.It has an entirely adaptable and granular separating alternatives just as exceptionally adjustable hunt capacities.

·

· 3.It is compact in nature and it checks for new highlights all the time

· 1.The UI is mind boggling.

·

· 2.It is a dongle based programming and doesn't work without it.

·

· 3.There is no help for Bitlocker.

Licensed Version Available

The Oxygen Forensic Suite

1.The Oxygen Forensics bundle is a portable crime scene investigation programming for coherent assessment of cell phones,

2.PDAs and PDAs. The suite can separate gadget data, contacts, schedule occasions, SMS messages, event logs, and records.

3.Similarly, it can likewise remove different kinds of metadata which is significant in any advanced criminological examination.

4.The suite gets to the gadget by using exclusive conventions.

· 1.Oxygen takes into account physical extraction data and information from Android gadgets.

·

· 2.The UI and choices are extremely basic and clear to comprehend.

·

· 3.The last report can be spared in different decipherable organizations such .xls, .xlsx, .pdf, and so on.

·

· 4.It is a financially better choice when contrasted with other portable criminological instruments.

·

· 5.It has a worked in usefulness that can be utilized to break passwords for encoded iTunes, bolted iPhone or android reinforcements.

· 1.Its help for scope of cell phones is constrained.

·

· 2.Since instrument is PC based, there is a higher likelihood of infection/malware entering inside the telephone that is being inspected.

·

· 3.It utilizes a beast power strategy which acquire a great deal of time to finish the procedure.

Paid

I will Prefer EnCase for Computer Forensic Investigation due to its simplicity of use and Multi dimensional/views support for report generation and also suitable for mobile gadgets .

Add a comment
Know the answer?
Add Answer to:
Case Project 14-5: Forensics Tools Search the Internet for websites that advertise computer forensic tools. Locate...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • (Use the case of “Global Treps”) You have been selected as the project manager for the Global Tre...

    (Use the case of “Global Treps”) You have been selected as the project manager for the Global Treps project. You helped to run a local shark tank like event at your college last year as part of a class project, so you have a general idea of what is involved. The schedule goal is six months, and the budget is $120,000. Your favorite professor, Dr. K., and a few of her associates have agreed to fund the project. Your strengths...

  • Read the case study "Google, Apple, and Facebook Struggle for Your Internet Experience" on page 255....

    Read the case study "Google, Apple, and Facebook Struggle for Your Internet Experience" on page 255. Then discuss the advantages and disadvantages for each company. BUSINESS PROBLEM-SOLVING CASE Google, Apple, and Facebook Battle for Your Internet Experience Apple has a legacy of innovation on its side. In Three Internet titans Google, Apple, and 2011, it unveiled the potentially market disrupting Facebook are in an epic struggle to dominate your Siri (Speech Interpretation and Recognition Internet experience, and caught in the...

  • Performance Improvement programs and effective project management require an understanding of the four phases of the...

    Performance Improvement programs and effective project management require an understanding of the four phases of the project life-cycle: initiation, planning, execution/implementation, and closure. It is important to have each phase of the project mapped on a timeline and to be sure the project team has the appropriate members with the right skills to ensure a successful program. Using a case study from the text, students will demonstrate their ability to review and evaluate a performance improvement program by arranging the...

  • Select two of the discussion questions and analyze the case study using project management principles. Apply...

    Select two of the discussion questions and analyze the case study using project management principles. Apply your knowledge of project management to the facts presented in the case study to describe how you would proceed. We only need to answer one of the questions. A thorough answer will probably require 300 to 500 words for each question.   Feel free to use text bullets, tables, or graphics to summarize your points. Questions Q1: Make or Buy decision – Describe the make...

  • How can we assess whether a project is a success or a failure? This case presents...

    How can we assess whether a project is a success or a failure? This case presents two phases of a large business transformation project involving the implementation of an ERP system with the aim of creating an integrated company. The case illustrates some of the challenges associated with integration. It also presents the obstacles facing companies that undertake projects involving large information technology projects. Bombardier and Its Environment Joseph-Armand Bombardier was 15 years old when he built his first snowmobile...

  • internal project 1 anything helps! thank you!! Instructions: Study the case that starts on page 3...

    internal project 1 anything helps! thank you!! Instructions: Study the case that starts on page 3 carefully. Then write concise answers to the following questions regarding the internal control system of Duarf, Inc. Clearly label your responses with proper headings and subheadings. Be very specific and precise. Answers that appear to be beating around the bush will not get any credit. 1. What are the controls in place that under normal conditions should function well to prevent embezzlements or frauds?...

  • The discussion: 150 -200 words. Auditing We know that computer security audits are important in business....

    The discussion: 150 -200 words. Auditing We know that computer security audits are important in business. However, let’s think about the types of audits that need to be performed and the frequency of these audits. Create a timeline that occurs during the fiscal year of audits that should occur and “who” should conduct the audits? Are they internal individuals, system administrators, internal accountants, external accountants, or others? Let me start you: (my timeline is wrong but you should use some...

  • Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around...

    Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...

  • Please read the article and answer about questions. You and the Law Business and law are...

    Please read the article and answer about questions. You and the Law Business and law are inseparable. For B-Money, the two predictably merged when he was negotiat- ing a deal for his tracks. At other times, the merger is unpredictable, like when your business faces an unexpected auto accident, product recall, or government regulation change. In either type of situation, when business owners know the law, they can better protect themselves and sometimes even avoid the problems completely. This chapter...

  • First, read the article on "The Delphi Method for Graduate Research." ------ Article is posted below...

    First, read the article on "The Delphi Method for Graduate Research." ------ Article is posted below Include each of the following in your answer (if applicable – explain in a paragraph) Research problem: what do you want to solve using Delphi? Sample: who will participate and why? (answer in 5 -10 sentences) Round one questionnaire: include 5 hypothetical questions you would like to ask Discuss: what are possible outcomes of the findings from your study? Hint: this is the conclusion....

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT