• Home
  • Blog
  • AIU Computer Forensics Image & Title Recovery Programs Discussion

AIU Computer Forensics Image & Title Recovery Programs Discussion

0 comments

Write a Response for the following Discussion Board question?

Computer Forensics’ Image Analysis

It is my understanding that computer forensics’ image analysis, which is also known as “computer vision” or “image recognition.,” is the process of identifying characteristics within an image using digital image processing techniques which ensures that the process is accurate, and images have not been compromised. The process is conducted for the purpose of examining common areas on the disk image for possible malware, hidden images, violations of company policies, and any other evidence of a crime. The potential evidence is identified can be further analyzed to determine the cause and establish the timeline of the crime occurrences (Prasad, n.d.). Some of the tools that can be used for image analysis are Disk imaging software, hashing tools, file recovery programs, software and hardware write tools, and Encase (6 Top computer forensic tools, 2009).

The Best Tool to Use for This Investigation

The tool that I would use to conduct an Image Analysis for this investigation is the Encase. I would choose this tool Encase because it is one of the most widely used commercial computer forensic tool made by Guidance Software. I would various investigative tasks can perform with Encase such as disk imaging and verification and analysis of data. Some digital evidence many have unallocated spaces which may contain valuable information in context with a cyber-crime investigation. With Encase, it is possible to inspect these unallocated spaces and collect the necessary data (6 Top computer forensic tools, 2009).

Benefits and Disadvantages of Using Encase

The benefits of using Encase is that it can break down complex file structures for examination, such as the registry files, dbx & pst files, thumbs db etc, it has timeLine, and full scripting abilities. It also allows automation of report, decryption, and carving. I would choose Encase over some of the other tools because it has a built-in mechanism for breaking down complex file structures so that they can be analyzed and investigated. It also only needs to be hashed once. Some of the Disadvantages of Using Encase are it has No progress bar, no multi-tasking, no scripting support, HFS (mac) not support, a 2 million file limit, no PSD or AVI support, requires a lot of work, has rough looking reports, no internal mail viewer, no full Indexing of the Drive, and only performs live searches (Atom, 2011). However, EnCase supports the detection and processing of multiple email mailbox formats, including EDB (Microsoft Exchange), DBX (Outlook Express) and even Unix-style MBOX files.

References

Atom. (2011, April 7). Advantages and Disadvantages of FTK and EnCase. Retrieved

from com/2011/04/sadvantages-and-disadvantages-of-ftk.html”>http://acid-burninfo.blogspot.com/2011/04/sadvantages-and-disadvantages-of-ftk.html

Nelson, B., Phillips, A., & Steuart, C. (2019). Guide to computer forensics and investigations (5th

ed.). Boston, MA: Cengage.

Prasad, R. (n.d.). Forensic analysis of digital media – 4 methods explained https://www.ci.security/resources/news/article/forensic-analysis-of-digital-media-4-methods-explained.

6 Top computer forensic tools. (2009, December 21).

https://www.ci.security/resources/news/article/forensic-analysis-of-digital-media-4-methods-explained

About the Author

Follow me


{"email":"Email address invalid","url":"Website address invalid","required":"Required field missing"}