Computer Science Homework Help

Bethesda University of California CISS 400 DEA Digital Forensics Questions

 

I’m working on a operating systems multi-part question and need an explanation and answer to help me learn.

Question 1

You look over your monitor and see Wenyi, your coworker, with her brow furrowed. She’s obviously frustrated so you ask her what’s wrong.

“I’m trying to do a brute force attack on the password file for a system I’m investigating, but this computer is too dang slow,” Wenyi says. Then, she quickly comes to a realization and asks, “Hey, actually, can I just use your computer real quick? I promise it’ll only take me a few minutes on yours.”

You have a lot of work to do and do not want to give up your computer, but you really do want to help her crack the password file.

So, what alternative can you offer? What were some of the other choices you considered? Why did you go with the alternative you selected?

Question 2

You’re wrapping up the analysis on your first digital investigation in a civil case. You have followed all of the textbook guidelines and are very sure you have done a thorough job. You captured seven images and the email files from the computer and placed them on a solid-state USB drive. You know you will need to prove that you preserved the evidence.

Write a paragraph for your report that explains the process you followed for preserving and protecting the data. Be sure to include something about the hash (you choose which one you would use) you used to validate the files were the same.