StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Forensic Evidence Analysis - Research Paper Example

Cite this document
Summary
Full Paper Title Name University Forensic Analysis Tool Previously, password guessing mechanisms were used only on a single computing unit utilizing a single processor. Distributed network access (DNA) is a new methodology for recovering files that are password protected…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER99% of users find it useful
Forensic Evidence Analysis
Read Text Preview

Extract of sample "Forensic Evidence Analysis"

Download file to see previous pages

The primary goal is to distribute the dissimilar and criteria based key search process to every workstation on the network. Likewise, users will not complain for any issue related to operating system performance, as DNA client only consumes the unused processor time (Decryption & password cracking software, n.d). Likewise, if more than one or many processors are used at the same time, result will come fast. Moreover, if a processor has two or more cores, performance increases accordingly. DNA has two modes i.e. dedicated or non-dedicated and these modes are applied on the workstations.

The dedicated mode requires a workstation that will exclusively utilize DNA network with no other tasks incorporated except the DNA password recovery that is a primary job. On the other hand, non-dedicated mode requires a workstation that will be used for other tasks as well. For instance, after working hours, workstations are available for use. These workstations can be assigned to DNA for contributing valuable computational efforts that are required for password recovery. If many workstations contribute to a password recovery process, a single workstation has the capability of analyzing 1000000 passwords per hours, and 24000000 passwords in 24 hours respectively.

Let’s suppose, DNA is using only 10 workstations on a non-dedicated mode for just 14 hours per day, the results will be 140,000,000 passwords for the same 24 hours with the increase of approximately six times than the previous one. Moreover, if more machines are added, a result for password recovery improves. However, workstation must be on the network and will be able to resolve the IP address so that the DNA server can establish connectivity to the DNA client. Workstations connect to the DNA server via DNA client and form a cluster for testing more passwords in less time.

Products related to DNA provide statistical information in the form of graphs and has the capability to add user dictionaries and customize them according to the requirements. Moreover, customization is also available for password attacks in explicit languages. Furthermore, DNA products also possess the feature of stealth client installation functions and automatic updates on DNA client from the DNS server. File formats that are supported includes spread sheet formats, PDF, data compression formats etc.

Network security audit Vulnerabilities or weaknesses that is probable to disrupt network services can be categorized in to interception, availability and access points. The interception category focuses on the data that is transmitted by utilizing a carrier or equipment over the network (Approach to auditing network security , n.d). The transmission conducted by these carriers and equipment can be interrupted and produce a risk of adverse discovery that can be related to breach in integrity of data.

Secondly, availability is concerned with the expansion of networks and more remote sessions are created to the internal applications, any disruption in availability of network services will impact business operations. Thirdly, access point is related to weak access point will allow a threat to penetrate within the network and disrupt or destroy confidential information available on mission critical systems (Approach to auditing network security , n.d). Focusing on the 3 categories, auditors will examine aspects of physical security

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Forensic Evidence Analysis Research Paper Example | Topics and Well Written Essays - 750 words”, n.d.)
Retrieved from https://studentshare.org/information-technology/1434351-forensic-evidence-analysis
(Forensic Evidence Analysis Research Paper Example | Topics and Well Written Essays - 750 Words)
https://studentshare.org/information-technology/1434351-forensic-evidence-analysis.
“Forensic Evidence Analysis Research Paper Example | Topics and Well Written Essays - 750 Words”, n.d. https://studentshare.org/information-technology/1434351-forensic-evidence-analysis.
  • Cited: 0 times

CHECK THESE SAMPLES OF Forensic Evidence Analysis

Significance of Forensic Evidence

Significance of forensic evidence Name: Professor: Course: Date: Introduction forensic evidence is anything that has been collected in a scene of crime that gives the description of the way the crime was done.... hellip; Another definition of forensic evidence can be evidence that can be used by a law court, especially the evidence that has been obtained via scientific methods like DNA tests, blood tests and ballistics (James & Nordby, 2009)....
8 Pages (2000 words) Research Paper

Forensic Science in 21st Century Criminal Justice Paper

Elizabeth Morgan (2007) defines forensics as “a field of science dedicated to the methodical gathering and analysis of evidence to establish facts that can be presented in a legal proceeding.... ?? Since forensic science is a marriage between the scientific methods of data gathering and analysis and the legal system, there are numerous protocols that are involved, especially the chain of command of handling evidence, which makes sure that the evidence is not tampered with at any point in the process of the investigation (Morgan, 2007 and Wolfe, 2001)....
4 Pages (1000 words) Essay

Characteristics of Computer Forensics

Computer forensics is relatively a new area developed in the According to US-CERT (2008), “computer forensics is the discipline that combines elements of law and computer science to collect and analyze data from computer systems, networks, wireless communications, and storage devices in a way that is admissible as evidence in a court of law” (US-CERT, 2008,p.... “From a technical standpoint, the main goal of computer forensics is to identify, collect, preserve, and analyze data in a way that preserves the integrity of the evidence collected so it can be used effectively in a legal case” (US-CERT, 2008,p....
5 Pages (1250 words) Essay

Forensic Material Identification Techniques, Spectroscopy

The current instrumental methods in forensic identification and analysis not only relies on technologies but also on sound theories on the application of forensic techniques in the analysis, identification and characterisation of toxic and nontoxic biological and chemical substances (Skoog, 2007).... The paper "Forensic Material Identification Techniques, Spectroscopy" highlights that the police department is faced with myriad situations in which evidence have to be presented and proved to be connected to the crime in questions....
8 Pages (2000 words) Coursework

Peculiarities of Digital Forensic

This paper demonstrates the importance of computer forensics, the process involved with it, data collection, admissibility of digital forensic evidence and detection of hidden data.... Ignoring computer forensics the organization is taking a risk by obliterating very important evidence or having forensic proof not allowed in a court of law.... As per the technological perspective, the major objective of computer forensics is to recognize, gather, save, and examine information in a systematic method that safeguards the reliability of the evidence gathered, consequently, it can be used efficiently in a legal case....
10 Pages (2500 words) Coursework

Mobile Forensics: Mobile Phones Handsets, SATNA V, PDA, USB

For instance, the cell site analysis following from the use of a mobile phone usage has really not been an exact science.... hellip; The author explains that mobile device forensics generally is a branch of digital forensics that recovers digital evidence or digital data from a mobile device through the use of forensic sound conditions.... Digital evidence and Computer Crime, Second Edition.... n trial to cub and manage these challenges, several tools exist to extract evidence from mobile devices but it is true that no one tool or method can manage to acquire all the evidence from all devices....
8 Pages (2000 words) Assignment

Forms of Evidence with an Objective Existence

forensic evidence starts at the scene.... The reason why such a high proportion of evidence is of no value in volume and major crime is the subject of our analysis.... If evidence is overlooked or inappropriately taken cared of at the scene, no amount of laboratory analysis or processing will be able to correct the problem and the scene typically cannot be revisited to have another attempt at acquiring further evidence (White 2004, p.... … Forensic EvidenceAnalysis of the reasons why such a high proportion of evidence is of no value in volume and major crimeIntroductionEvidence can be divided into two broad types....
8 Pages (2000 words) Essay

Principles of Cyber Forensic

The paper "Principles of Cyber Forensic" discusses what digital evidence entails, the principles of cyber forensic, and computer data threats....  The processes of investigation used to preserve, locate, select analyze, validate as well as present digital evidence are discussed.... hellip; This paper discusses cyber forensics which is a process of investigating the cyber or digital crime, collecting the data, as well as analyzing them to come up with enough tangible digital or physical evidence that can be presented into a court of law to and ensure that the suspect is justifiably judged....
14 Pages (3500 words) Literature review
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us