Computer science

This case study should be written from the perspective of a computer forensic investigator for a Digital (Computer) Forensics class.Your supervisor has asked you to research current acquisition tools. Using your preferred Internet search engine and the vendors listed in this chapter, prepare a report containing the following information for each tool and stating which tool you would prefer to use:• Computer forensics vendor name• Acquisition tool name and latest version number• Features of the vendor’s productWith this data collected, prepare a spreadsheet listing vendors in the rows. For the column headings, list the following features:• Raw format• Proprietary format• AFF format• Other proprietary formats the tool can read• Compression of image files• Remote network acquisition capabilities• Method used to validate (MD5, SHA-1, and so on)