Dq4

“Virtual Machine Forensics” 

  • Go to the Forensic Focus website to read the article titled “Virtual Forensics: A Discussion of Virtual Machines Related to Forensics Analysis,” dated 2008, located at http://www.forensicfocus.com/downloads/virtual-machines-forensics-analysis.pdf.
  • Determine what you perceive to be the greatest challenge when dealing with virtual machines from a system forensics perspective. Provide a rationale for your response.
  • Describe how virtual machines can be used in a forensics investigation. Using the Internet, provide a link to a set of tools that is considered a forensic imager that could be launched using virtualization.

Dq5

“Operating System Forensics”

  • Use the Internet or the Strayer Library to research at least one commonly used Linux-based system forensics software tool. Describe the tool’s primary uses, strengths and weaknesses, competing products, costs, system requirements, and whether military, law enforcement and / or private corporations use the tool. Provide a link to the tool. Discuss the difference between open source (free ) tools and those that are purchased. From your research, which tool is more efficient? Justify your answer.

Dq6

“Graphic File Evidence”

  • Using the Internet, search for three steganography tools. Describe the tools’ primary uses, strengths and weaknesses. Also describe competing products, costs, and system requirements. Share the links with your classmates.
  • Evaluate the importance of graphic files to a digital investigation. Provide a scenario in which a graphic file would be considered an invaluable piece of evidence. File Evidence”
  • Using the Internet, search for three steganography tools. Describe the tools’ primary uses, strengths and weaknesses. Also describe competing products, costs, and system requirements. Share the links with your classmates.
  • Evaluate the importance of graphic files to a digital investigation. Provide a scenario in which a graphic file would be considered an invaluable piece of evidence.