Order from us for quality, customized work in due time of your choice.
Digital forensic investigators are often tasked with locating and examining digitally-held data during a case investigation. However, various devices can be found at the scene, meaning that each information storage unit must be analyzed according to its technical characteristics (Angelopoulou et al., 2016). For instance, personal computers, USB drives, and computer disks are the most frequently encountered digital devices that might contain useful information for investigators.
To appropriately examine the digital computer data, the researcher must overcome the challenges connected to the evaluation of this particular device. Personal computers and laptops may be protected by passwords, unique codes, or other methods of preserving the information contained. Furthermore, computers can also have programs or applications that delete data when an intrusion is sighted, meaning that an uncareful approach to information collection can cause the destruction of available files (Muraski & Knetzger, 2007). However, to recover the data more efficiently, the investigator might use protection removal programs to avoid damaging the data or causing malfunctions due to forced entry.
When handling USB drives, similar complications can be encountered, as USB drives might also be password-protected to prevent unauthorized access. However, it is also possible that the device might be corrupted, which can tremendously hinder the process of extracting the original data in full (Muraski & Knetzger, 2007). To improve the data analysis, an investigator could use specific programs or equipment that modify the devices protection and remove present hazards.
Finally, computer disks can also cause obstacles during a digital investigation. As laser disks, such as CDs or DVDs, are less frequently used in the current age, their format might not be compatible with modern storage systems or applications (Angelopoulou et al., 2016). In addition, such items are easily damaged due to their fragility, and previously incurred cuts may cause the disk to become unreadable. Therefore, to avoid potential issues, the investigator may convert the contained files into a more appropriate format or remove the scratches using a solution.
References
Angelopoulou, O., Vidalis, S., & Jones, A. (2016). Extracting intelligence from digital forensic artifacts. 15th ECCWS: European Conference on Information Warfare and Security.
Muraski, J., & Knetzger, M. (2007). Investigating high-tech crime, vitalsource for Kaplan University. Pearson Learning Solutions.
Order from us for quality, customized work in due time of your choice.