Harvard University Cyber Security and Digital Evidence Discussion

User Generated

Znfba1566

Computer Science

Harvard University

Description

Research how to acquire digital evidence from disk drives and create an evidence image without altering the original data.

What is a disk image?

What is a write blocker?

How is chain-of-custody enforced?

Is a digital copy better than a physical copy?

3 PAGES

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached. Please let me know if you have any questions or need revisions.

Running head: CYBER SECURITY

1

Cyber Security: Digital Evidence

Name

Institutional Affiliation

CYBER SECURITY

2

Cyber Security: Digital Evidence

Acquiring Digital Evidence from Disk Drives

Any form of digital files from electronic sources is a significant representation of digital
evidence. Computer documents, emails, transaction images, instant messages, texts, and internet
browsing histories are the primary examples of digital files that store information and can be
used to gather evidence from electronic devices. Some of these digital devices that digital
evidence is gathered include the mobile gadgets based on backup systems such as cloud or
Google (Sudyana & Lizarti, 2019). Forensic investigators attempt to access all text messages,
pictures, or files stored on different phones, tablets, or computers to gather the information they
need.
Digital forensics specializes in collecting all forms of suspected digital data from disk
drives to fight electronic crimes such as fraud and piracy through three critical steps. The first
and the most crucial step are seizing the media drive with the suspected information...


Anonymous
Really useful study material!

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags