Project - Case Study Example

Comments (0) Cite this document
A lot of research has been undertaken in the field of computer forensics in order to protect data stored in a computer from copying and many companies have come up with a number of technologies which are able to accelerate the process of imaging. The speed of acquiring an image…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER95.8% of users find it useful
Case project
Read TextPreview

Extract of sample "Project"

Acquiring an image from Linux Operating system. A lot of research has been undertaken in the field of computer forensics inorder to protect data stored in a computer from copying and many companies have come up with a number of technologies which are able to accelerate the process of imaging. The speed of acquiring an image is normally based on both the physical state of the media, the processor and the type of operating system in use. Initially, images could be easily acquired from computers using the DISKCOPY command since the amounts of data involved were small in size [1]. Different methods have been developed to cater for the different operating systems and large file sizes include Smartsector for windows and Linux dd for the Linux operating system which are able to operate in both file by file and sector by sector modes of imaging hence increasing the speed of fragmentation. These new technologies are also able to image from more than a single storage device including hard drives, removable media devices and tapes.
In order to acquire an image disk from a Linux operating system, various methods of acquiring images have been developed including: Safeback version 2.0 technique which is able to acquire images on various operating systems on the IDE drives of computers using the sector by sector method; the snapback DataArrest technique which acquires images on SCSI drives of computers using the sector by sector method and DIBS RAID technique which performs optical acquisition of images on both the SCSI drive and the IDE drive of the computer using both the sector by sector and the file by file methods. These methods hold a major strength in the fact that they are able to handle large amounts of data unlike the traditional methods.
However, the most appropriate tool to use is the Linux dd version 7.0. This tool acquires images from the hard drive of the computer. External storage devices such a removable disks, tapes, flash drives and compact disks can also be used with this tool to perform imaging in a Linux environment. Linux dd version 7.0 is able to perform image verification by AMD5 checksum verification method [2]. This tool shows high levels of strength in computing complexity and it is very good in detection modification. The probability of programs collision is very low. Imaging is then done on the SCSI drive of the computer unlike other methods of imaging that perform imaging in the IDE drive. Copying of data into the hard drive is normally done using both modes of imaging which are sector by sector and file by file. This tool is able to eliminate any form of slowdown in imaging and it is not affected by fragmentation of the files in the hard drive of the computer [2]. However, acquiring an image using this tool can be affected by corruption of data and possible failure of the system.
Imaging is a very crucial process in computer forensics in order to ensure that the data stored in computers is secured. While performing this process, it is important to choose the right type of tool and methodology in order to avoid problems that result from poor imaging. The field of computer forensics is growing each day and new technologies are emerging thus improving the efficiency of the process of imaging. It is also important to be considerate of the type of operating system while acquiring images from different platforms.
[1] Holley,James. “Computer Forensics.”On-line SC InfoSecurity Magazine.September 2000. Retrieved from: Viewed on 20th march 2015.
[2] “Computer Forensics Definition.” New Technologies Armor, Inc. 25 April 2001.Retrieved from: http :// Viewed on 20th march 2015. Read More
Cite this document
  • APA
  • MLA
(“Case project Study Example | Topics and Well Written Essays - 250 words”, n.d.)
Case project Study Example | Topics and Well Written Essays - 250 words. Retrieved from
(Case Project Study Example | Topics and Well Written Essays - 250 Words)
Case Project Study Example | Topics and Well Written Essays - 250 Words.
“Case Project Study Example | Topics and Well Written Essays - 250 Words”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document


Case Project Troubleshooting WANs

...?Case Project- Troubleshooting WANs It is very likely that the problem occurs with the Service Department’s internet gateway. The department’s link to the Internet Service Provider can also be faulty. To troubleshoot the problem, I would try to send a TCP/IP based command or ping command to their default gateway through my workstation, by typing ping [IP address of the department’s gateway] at the command prompt. This is important to check the basic connectivity or packet loss. In case of error messages, I would verify the physical layer connectivity to that gateway because most network problems occur due to trouble in cables, network adapters, poorly done connections and hubs. This step...
2 Pages(500 words)Coursework

Examining switching costs as a moderator in the relationship between service personalization, customer satisfaction and customer

12 Pages(3000 words)Essay

(SMCR) Strategic Marketing- A Contemporary Review

12 Pages(3000 words)Essay

Case project

...with issues related to energy. The executives practised off-book accounts which negatively impacted on the operations of the organisation. The executives of the company capitalised on the use of loopholes in the accounting system as well as poor financial reportage Hanson (1). Debts amounting to billions of dollars in projects and deals which did not succeed were hidden in the process. The company misrepresented its financial statements in order to portray a positive picture to the shareholders about its performance. Interestingly, the company sought to appeal to investors through falsehoods. In actual case, this was not the situation obtaining on the ground given that it hid its financial statements...
6 Pages(1500 words)Case Study

Case project analysis

...Case Project Analysis Table of Contents Introduction 3 Summary 3 2 Appropriate Financial Planning and Use of Effective Data Management Tools 3 2.2 Structuring of the Overall Project Activities 4 2.3 Environmental Safeguard 4 2.3 Operational / Equipment Quality Assessment (QA) and Quality Control (QC). 4 3. Work Breakdown Structure (WBS) 5 3.1 Work Breakdown Structure (WBS) For the Undertaken Contract 5 3.1.2 Wind Energy Generation Plan 7 3.1.3 Solar Energy Generation Plan 8 3.1.4 Geo thermal Power Setup 9 3.1.5 Hydro Electric Plant Setup 10 4. Stakeholder Identification and Analysis 12 4.1 Identification of Stakeholder Groups (Primary and Secondary) 12 4.2 Justification of the Stakeholder...
10 Pages(2500 words)Assignment

Case project analysis

...Project Management Springfield Interchange Improvement Project vs. the Guri Dam Project Executive Summary The paper provides an overview of two megaprojects: the Guri Dam project and the Springfield Interchange Improvement project. Both projects are analyzed based on the four key project management practices: project selection, project delivery system, project planning, and project control. In both case studies there was identified the same model used for the project selection - Benefit Measurement Model. While for the...
10 Pages(2500 words)Assignment

Unit 4 Case Project Qeustions

...Project Your company has been hired by Hogan Enterprises to expand the capabilities of their network, and you have been given the project. They have decided to first implement a new TCP/IP addressing scheme using VLSM. They have also expressed interest in wireless technology, as well as an overall concern for security of their network. All their employees are allowed to access the Internet. Many employees have asked about access to company resources from home so they can telecommute, for example, when the weather is bad. After meeting with members of their technical staff, you found they are currently running RIPv1 on a network consisting of seven routers, four of which are Cisco routers. In the meeting,...
1 Pages(250 words)Coursework

Case Project Assignemnt

...Comparing Antivirus Software al affiliation Comparing Antivirus Software The basic features of Kaspersky Antivirus that are differentfrom other vendors’ products include fast virus detection, high-speed scanning, and proactive defense component. Kaspersky Antivirus is fast at detecting malware because its signature files are updated after every hour. According to Dennis Technology Labs (2013), Kaspersky Antivirus has a detection accuracy rating of 97%. The detection rate considers how the antivirus differentiates malware from legitimate applications. Kaspersky Antivirus is also the best in terms of preventing threats from compromising a computer. In this case, Kaspersky Antivirus can prevent up to 99% of malware from...
2 Pages(500 words)Assignment

Case Project Assignemnts

...Case Project Assignments al Affiliation: Project 8 Viewing a Digital Certificate in Windows XP or higher version Summary Report This section presents the involvement of viewing a Digital Certificate in Windows XP or higher version. In this particular simulation, the Windows 7 operating system was used to accomplish this task. The highlighted project requires special permission set by the operating system administrator. The experience and finding of the project are shown below: Experience To aid in emphasizing the experience and understanding of the project there is the use of visual diagrams that showcase the procedural steps taken...
5 Pages(1250 words)Assignment

U2 Case Project

...Case Project (Couse Number) February 9, (Faculty) Case Project In the first section of the study we are going to focus on research findings about,, and based on publicly available information about the trio. Let us now begin by featuring and then proceed to the next domain in the order of listing. Part 1 1. i. IP Address The IP address of is This is piece of open information is obtained through a ping command, that is, “ping”. ii. Domain Email Address From the raw registrar data at we are able to obtain the domain email address for which is iii....
1 Pages(250 words)Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Case Study on topic Case project for FREE!

Contact Us