Computer science

This case study should be written from the perspective of a computer forensic investigator for a Digital (Computer) Forensics class.

Your supervisor has asked you to research current acquisition tools. Using your preferred Internet search engine and the vendors listed in this chapter, prepare a report containing the following information for each tool and stating which tool you would prefer to use:

• Computer forensics vendor name

• Acquisition tool name and latest version number

• Features of the vendor’s product

With this data collected, prepare a spreadsheet listing vendors in the rows. For the column headings, list the following features:

• Raw format

• Proprietary format

• AFF format

• Other proprietary formats the tool can read

• Compression of image files

• Remote network acquisition capabilities

• Method used to validate (MD5, SHA-1, and so on)

TAKE ADVANTAGE OF OUR PROMOTIONAL DISCOUNT DISPLAYED ON THE WEBSITE AND GET A DISCOUNT FOR YOUR PAPER NOW!