27 Jan 2023

62

Forensic Tools: Hardware and Software Write-Blockers

Format: APA

Academic level: College

Paper type: Coursework

Words: 382

Pages: 1

Downloads: 0

Hardware and software write blockers do similar work. The difference is that software write-blocker are installed in workstations of the computer while hardware write-blocker are installed in controller chip in a portable device (Lyle, 2006). The hardware write-blocker offers interfaces that are built in and block any command operation modification. Some of its functions are filtering and monitoring ay activity received or transmitted between connections to the provided storage device and the computer.

A write blocker is essential as it provides read-only data without interfering with data integrity. It guarantees the protection of the data chain if appropriately used. “National Institute of Standards and Technology (NIST)” states on the use of the write blockers that procedures are followed by an investigator to block any program execution that could modify any disk contents. The strategies involve creating a hardware jumper and use of a hard disk to intercept any disk writes. The tool allows no changes to a safe drive and access to the drive's information.

It’s time to jumpstart your paper!

Delegate your assignment to our experts and they will do the rest.

Get custom essay

Explain the steps you would take, from receipt of the evidence until testimony, including the reasons why you would make each step. For example, what would you check for when you sign for the drive on the chain of custody document?

Identification of the hard drive: The reason is for report maintenance of the situation that is logged into an Evidence log. The identification happens after ensuring the safety of data and equipment (Rogers & Seigfried, 2004). Hence, no tampering occurs.

Verification process: It is essential to examine the scope and the breadth of the case and determining the nature and specifics of the situation. Nonetheless, files can be protected, deleted or hidden and not overwritten. All data should be made more copies in the system during the search process of evidence.

Recovery of data is another critical step to detect data that could have been hidden (Biggs & Vidalis, 2009). Useful applications are used. Access of protected files and decryption is also done.

Analysis of the disk helps in determining unallocated space that could have different parts of the provided files relevant to the ongoing case.

Documentation then helps in the provision of full proof that relevant information is preserved without any alterations. Nonetheless, a system’s report is provided on the physical layout and on encryption.

Testimony: As an expert, one should be prepared to be present and testify in court based on computer forensics findings.

References 

Biggs, S., & Vidalis, S. (2009, November). Cloud computing: The impact on digital forensic investigations. In Internet Technology and Secured Transactions, 2009. ICITST 2009. International Conference for (pp. 1-6). IEEE.

Lyle, J. R. (2006). A strategy for testing hardware write block devices. digital investigation, 3, 3-9.

Rogers, M. K., & Seigfried, K. (2004). The future of computer forensics: a needs analysis survey. Computers & Security, 23(1), 12-16.

Illustration
Cite this page

Select style:

Reference

StudyBounty. (2023, September 16). Forensic Tools: Hardware and Software Write-Blockers.
https://studybounty.com/forensic-tools-hardware-and-software-write-blockers-coursework

illustration

Related essays

We post free essay examples for college on a regular basis. Stay in the know!

17 Sep 2023
Criminal Justice

Research in Criminal Justice

Research is the primary tool for progressing knowledge in different fields criminal justice included. The results of studies are used by criminal justice learners, scholars, criminal justice professionals, and...

Words: 250

Pages: 1

Views: 166

17 Sep 2023
Criminal Justice

The Art of Taking and Writing Notes in Law Enforcement

Every individual must seek adequate measures to facilitate input for appropriate output in daily engagements. For law enforcement officers, the work description involving investigations and reporting communicates the...

Words: 282

Pages: 1

Views: 183

17 Sep 2023
Criminal Justice

Justice System Issues: The Joseph Sledge Case

The Joseph Sledge case reveals the various issues in the justice system. The ethical issues portrayed in the trial include the prosecutor's misconduct. To begin with, the prosecution was involved in suppressing...

Words: 689

Pages: 2

Views: 252

17 Sep 2023
Criminal Justice

Victim Advocacy: Date Rape

General practice of law requires that for every action complained of there must be probable cause and cogent evidence to support the claim. Lack thereof forces the court to dismiss the case or acquit the accused. It...

Words: 1247

Pages: 4

Views: 76

17 Sep 2023
Criminal Justice

New Rehabilitation and Evaluation

Introduction The rate of recidivism has been on the rise in the United States over the past two decades. Due to mass incarceration, the number of people in American prisons has been escalating. While people...

Words: 2137

Pages: 8

Views: 140

17 Sep 2023
Criminal Justice

Justification of Reflections and Recommendations

Credible understanding and application of criminal justice require adequacy of techniques in analyzing the crime scene, documenting the shooting scene, and analysis of ballistic evidence. The approaches used in...

Words: 351

Pages: 1

Views: 128

illustration

Running out of time?

Entrust your assignment to proficient writers and receive TOP-quality paper before the deadline is over.

Illustration