Task 1: Case Project
Your supervisor has asked you to research current acquisition tools. Using your preferred Internet search engine and the vendors listed in Chapter 2 of the textbook, prepare a report containing the following information for each tool and stating which tool you would prefer to use:
• Forensics vendor name
• Acquisition tool name and latest version number
• Features of the Vendors' product
With this data collected, prepare a spreadsheet or table listing vendors in the rows. For the columns headings, list the following features:
• Raw format
• Proprietary format
• AFF format
• Otherproprietrary format the tool can read
• Compression of image files
• Remote network acquisition capabilities
• Method used to validate (MF5, SH-1, and so on.
(Nelson, Phillips, &Steuart 2015)
Deliverable: Spreadsheet or table inserted in the assignment document.
Task 2: Research Project
You have just been hired to perform digital investigations and forensics analysis for a company. You find that no policies, processes, or procedures are currently in place. Do an Internet search to find information, and then create a policy and processes document to provide the structure necessary for your lab environment. Be sure to cite your online sources. (Nelson, Phillips, &Steuart 2015)
Deliverable: Policy and process no more than 500 words inserted in the assignment document.
Rationale
This assessment task covers digital crime, forensic process and procedures, data acquisition and validation, e-evidence, e-discovery tools and equipment. This assessment has been designed to ensure that you are engaging with the subject content on a regular basis. More specifically it seeks to assess your ability to:
• determine the legal and ethical considerations for investigating and prosecuting digital crimes
• formulate a digital forensics process
• evaluate the technology in digital forensics to detect, prevent and recover from digital crimes
• analyse data on storage media and various file systems
• collect electronic evidence without compromising the original data
• evaluate the functions and features of digital forensics equipment, the environment and the tools for a digital forensics lab
hi these are my vendor names
1.pro discover basic
2.linux
3.access data forensic
4.passware
5.os forensic
6.john the ripper
7.oph crack
format for vendors should e like as shown in the figure like table format
Vendor
|
Name of software
|
Description
|
V1
|
|
Features...
|
V2
|
|
|
......
|
|
|
Vn.
|
|
|