This requires that you watch the anti-forensics video. After that please complete this assignment with a paragraph for each answer.
Anti-Forensics and Anti-Anti-forensics: Attacks and Mitigating Techniques” is a video by Michael Perklin. The author of the video takes around 49 minutes and ten seconds to talk about digital forensics. Three major points have been discussed by Michael, these are a discussion on digital complications, techniques which can complicate digital-forensic examinations, and methodologies to mitigate the said techniques.
To start with Michael Perklin is a digital forensic examiner and computer programmer. From his tutorial, I have learned some various complications which can arise during digital investigation (Marshall, 2009). One is the typical workflow during digital investigation process; the first one is creating a copy, processing data for analysis, then analyzing data for relevance, preparing a report on findings, and archiving data for future. One of the issues I never knew is that when preparing a report, one has to include snapshots, snippets or thumbnails. In addition, I have learned that how investigators are paid; according to Michael, the intermediate investigators are paid on an hourly basis for 300 US dollars. In addition is the stage number two which is the process data for analysis; this stage involves hashing, file type identification, and full-text indexing.
One of the things that surprised me is on stage four that is separating the “wheat from the chaff”; the process takes 16 hours which calculates to $4800. What astonished most is the payment of the investigators. From the description of all the stages, it seems that digital forensic investigators reap a lot of money after the overall process. This made me re-think my career. I thought I would be an information security analyst but according to the figures given by Michael, I think I might be a digital forensic investigator. Lastly, the statement by Michael surprised me i.e. “smart investigators never say that this occurred at this time” but they say they say logs show that it occurred at this time” (Lammle, 2015).
Carvey. (2016). Windows Registry Forensics: Advanced digital forensic analysis of Windows registry. Chicago: Chicago Press.
Lammle, T. (2015). CompTIA Network+ Study Guide. Indianapolis: Sybex.
Marshall, A. M. (2009). Digital Forensics : Digital Evidence in Criminal Investigations. London: Spring Press.
Sachowski. (2016). Implementing Digital Forensic Readiness: From Reactive to Proactive. NewYork: Spring Press.
To export a reference to this article please select a referencing stye below:
My Assignment Help. (2021). Digital Forensic. Retrieved from https://myassignmenthelp.com/free-samples/fg45-digital-forensic/attacks-and-mitigating-techniques.html.
"Digital Forensic." My Assignment Help, 2021, https://myassignmenthelp.com/free-samples/fg45-digital-forensic/attacks-and-mitigating-techniques.html.
My Assignment Help (2021) Digital Forensic [Online]. Available from: https://myassignmenthelp.com/free-samples/fg45-digital-forensic/attacks-and-mitigating-techniques.html
[Accessed 19 April 2021].
My Assignment Help. 'Digital Forensic' (My Assignment Help, 2021) <https://myassignmenthelp.com/free-samples/fg45-digital-forensic/attacks-and-mitigating-techniques.html> accessed 19 April 2021.
My Assignment Help. Digital Forensic [Internet]. My Assignment Help. 2021 [cited 19 April 2021]. Available from: https://myassignmenthelp.com/free-samples/fg45-digital-forensic/attacks-and-mitigating-techniques.html.
Chicago referencing is one of the most common referencing styles used in various papers and academic documents. Students studying in academic institutions need to be well-versed with the Chicago format citation as many colleges and papers demand such referencing style. Our citation generator tool has gained immense popularity owing to corrected Chicago style references generated in few seconds. The best part is that it can produce chicago referencing for books, blogs, articles, journals, e- newspapers along with all types of other academic documents. It produces detailed and precise citations, strictly in adherence to Chicago style Referencing Rules. Now get over chances of improper referencing that can lead to charges of plagiarism.
Answer Introduction The report will discuss about the importance of UML in bringing the success towards OO software projects today. Object oriented software engineering is a methodology and object modelling language. Ivar Jacobson developed Object oriented software engineering in 1992 (Larman 2014). UML is a standard language used for constructing, specifying, visualising and for documenting artefacts associated with developing a software sys...
Read MoreAnswer “Indeed every opinion is a marriage of information and predisposition”. This is one of arguments made by Zaller in his book, “The Nature and Origin of Mass Opinion”. Undoubtedly the elite discourse has a very crucial role to play in determining the information which voters have regarding potential election candidates (Zaller, 1992). You like or not quite a large number of people who live in large societies a...
Read MoreAnswer: Introduction: Procurement is one of the most important strategic areas of operations in modern business organisations. The pressing need to embrace profitability and sustainability simultaneously has led the business organisations to form strategies to procure raw materials and spare parts. Efficient management of procurement enables the firms to maintain lower cost of production which ultimately raises the profit percentage. Efficien...
Read MoreAnswer: Introduction Innovations are a fresh idea of a person for solving a problem in an efficient way. These are improving the business processes in different terms, such as increasing efficiency, more productivity, better services, and quality products. Innovations are base for effective business operations. It is a way to change previous ideas for more growth and benefits to the business of an organization (Baregheh, Rowley, & Sa...
Read MoreAnswer: Reflective Report An unusual assignment, which was given to us by the Organizational Behavior and Leadership styles subject respected instructor Dr. Sulafa Badi. This assignment is to make a (12) minutes video to reflect some theories we discussed in this subject, and to demonstrate them on the real-life employee in the daily work in the company. In this report we will write how we worked together as a team to produce this video. We ...
Read MoreJust share requirement and get customized Solution.
Orders
Overall Rating
Experts
Our writers make sure that all orders are submitted, prior to the deadline.
Using reliable plagiarism detection software, Turnitin.com.We only provide customized 100 percent original papers.
Feel free to contact our assignment writing services any time via phone, email or live chat. If you are unable to calculate word count online, ask our customer executives.
Our writers can provide you professional writing assistance on any subject at any level.
Our best price guarantee ensures that the features we offer cannot be matched by any of the competitors.
Get all your documents checked for plagiarism or duplicacy with us.
Get different kinds of essays typed in minutes with clicks.
Calculate your semester grades and cumulative GPa with our GPA Calculator.
Balance any chemical equation in minutes just by entering the formula.
Calculate the number of words and number of pages of all your academic documents.
Our Mission Client Satisfaction
It was perfect I don\'t have to get it redone really on point and very happy with it thanks so much. You guys are a lifesaver
Australia
Good work from them!! Great service!! They didn’t make me wait on my work I got it on time!!
Australia
a great work. to be honest i was\'t sure if the expert would get everything right, but it turned really well.
Australia
The work has been done properly, exactly as required. I\'m very happy with it. Thanks to the expert for such a masterpiece.
Australia