question archive How would you go about preparing a forensic copy of a disk? Would your procedure change if it was a RAID device? How about if it was a SSD? How would you do it if you were using a Unix or Linux computer?
Subject:Computer SciencePrice:3.86 Bought20
How would you go about preparing a forensic copy of a disk? Would your procedure change if it was a RAID device? How about if it was a SSD? How would you do it if you were using a Unix or Linux computer?
Part-1:
Preparing a forensic copy of a disk:
To create the forensic copy of a disk will create the full disks and its partitioned and it can go to create a copy through any of the disks such as HDD, SSD, USB, etc. The following command will be typing through in terminal and follow the procedure steps
1. Enter the command in the command prompt like lsblk and execute the command, it will show the disk as SDA and partition of SDA1, SDA2, and SDA3 of the disks also included in the output
2. In that the label of the SDA denotes a disk as D and the label of P denotes the partitions of that disk of SDA1, SDA2, and SDA3.
3. Its simply to change if = to/dev/sda and to the suitable partition disk name
4. For example if the user want to back up the whole disk and need to back with 'sda' with the file name of disk-forensic-1.img and the following command of the sda will look like
dc3dd if=/dev/sda hof=./forensic-copies/disk-forensic-1.img
hash=md5 hash=sha256 log=. /file-log verb=on ssz=512
Part-2:-
The procedure of forensic copy of the disk in Raid device: The procedure of the forensic copy of the disk in raid device is to the device identification and gaining the digital data and the forensic copy of the disk in raid device have two procedure as follows-
Part-3:
About if it was an SSD: The solid-state drive is like a hard drive without moving the hard drive and it's like a memory card will be used in digital cameras, desktop, and laptop computers. Without moving the parts will allow the data to be transferred with maximum speeds.
The five things about if it was an SSD procedure as follows as
Part:-4:
If the user were using a Unix or Linux computer: If the user is using the Linux operating system is like a kernel and the operating system will collect the information of which are working as fully functional and with the complete product. The kernel is a small piece for the OS in Linux and the Linux having a group of drivers that will be handling the hardware uses.
Step-by-step explanation
Part-1:
Preparing a forensic copy of a disk:
To prepare to create the copy of a disk will have various options while running the dc3dd and the following options are as follows
Part-2:
The procedure of forensic copy of the disk in Raid device: This procedure of the source drive will be verified through the computing of the hash value for the whole drive which implies to be applied before the duplication and after the duplication. The source drive will have the same data after the duplication so that it is considered as unchanged and if the data was duplicated in the same drive, the result of the hash value and result of the hash value should have the same value through the drive.
Acquiring a Complete Disk Image: The computer forensic copy of a disk while using the imagine disk tool will correct the RAID volume and it will not copy all the information in a drive and it has the two cases of imaging tool will meet that needs a volume to be an image by a RAID controller and it's removing the drive.
Part-3:
About if it was an SSD:
The five things about if it was an SSD procedure as follows as
Part:-4:
If the user were using a Unix or Linux computer: The Linux and Unix have some little difference and the Unix will consist of three main parts as the kernel in Linux, the shell, and at last the program. Unix has either a file and a process. The process of the Unix is used to run the program that will identify with a unique PID. The file is defined as a collection of the data and created through the users of using the editors and compilers.