Computer science
This case study should be written from the perspective of a computer forensic investigator for a Digital (Computer) Forensics class.
Your supervisor has asked you to research current acquisition tools. Using your preferred Internet search engine and the vendors listed in this chapter, prepare a report containing the following information for each tool and stating which tool you would prefer to use:
ï Computer forensics vendor name
ï Acquisition tool name and latest version number
ï Features of the vendorís product
With this data collected, prepare a spreadsheet listing vendors in the rows. For the column headings, list the following features:
ï Raw format
ï Proprietary format
ï AFF format
ï Other proprietary formats the tool can read
ï Compression of image files
ï Remote network acquisition capabilities
ï Method used to validate (MD5, SHA-1, and so on)
TAKE ADVANTAGE OF OUR PROMOTIONAL DISCOUNT DISPLAYED ON THE WEBSITE AND GET A DISCOUNT FOR YOUR PAPER NOW!