You\'re investigating a case involving an employee who\'s allegedly sending inap
ID: 3583823 • Letter: Y
Question
You're investigating a case involving an employee who's allegedly sending inappropriate photos via e-mail in attachments that has been compressed with a zip utility. As you examine the employee's hard drive, you find a file named Orkty.zip, which you suspect is a graphics file. When you try to open the file in an image viewer, a message is displayed indicating that the file is corrupt. Write a one page report explaining how to recover Orkty.zip for further investigation. (1 Page) (Chapter 8 - This is a hint as you where you should start researching your answer. Of course you can use information from any chapter and/or the Internet) You have acquired a forensic image of a suspect's laptop. After doing an examination, you discover at least one Virtual Machine (VM) installed, and you think more data can be found, but you aren't sure. You decide to make a copy of the VM's files and mount the VM as an external drive. Write the best procedure for this situation (1 Page) (Chapter 10) To examine a cloud environment, you must have the latest knowledge on cloud encryption. Conduct online research, and write a report about current vendors and services for encrypting data stored in the cloud. List the vendors, their products, and what type of cloud service level (PaaS, laaS and/or SaaS) each tool is intended for. (1.5 Pages) (Chapter 13) Your digital forensics company has been hired to verify the local police department's findings on a current case. Tension over the case is running high in the city. What do you need to ask the police investigator for, and what procedures should you follow? Consider what test(s) you might use to validate the police department's findings. (1.25 - 2 Pages) (Chapter 14)Explanation / Answer
Question 1: Recover Orkty.zip use any of the below softwares
a. DiskInternals ZIP Repair
b. Zip2Fix
c. Object Fix Zip
d. PoweArchiver
e. Zip Repair Pro
Give a general description of the products mentioned above
Question 3: Here is a list of Vendors and Service for encrypting data stored in the cloud in alphabetical order.
Absolute Software specialise in endpoint and mobile security software and deliver Absolute Secure Drive which is a management console for self encrypted drives. This is not the usual endpoint encryption type software you would install on an endpoint, but rather if the manufacturer has already implemented SED's (self encrypted drives) into the devices you own then this could be a good option.
Becrypt specialise in data protection and data security products including port control, full disk and mobile device encryption software for businesses.
BlockMaster is a USB encryption vendor that provides encrypted USB devices and a central management console to manage multiple USB drives.
Check Point Software Technologies is a leading security vendor and offer both full disk and removable media encryption.
Credant Technologies specialise in data encryption, security and compliance. Credant Technologies offer encryption for mobile devices and client systems as well as port control and other solutions.
Cryptzone provide a range of security solutions including centralised USB and hard disk encryption.
Deslock is an encryption vendor that provides endpoint encryption for both consumers and business users. Deslock have a basic free version of their software.
Echworx is an encryption vendor and offer encryption solutions for endpoints, network and offer a cloud based encryption service. You can set policies via an admin console and specify the types of files that require encrypting, who is allowed to view these files and so on.
FalconGaze is a provider of encryption and data leakage products and offer FalconGaze EndPoint Encryption.
High Density Devices is a data protection vendor offering self encrypted hard disk drives. High Density Devices have met both FIPS 140 for their cryptographic modules and Common Criteria Level 4+.
Identiware is an authentication and encryption solutions provider. Identiware offer encrypted USB drives and hard disks.
iStorage deliver secure portable hard drives where data is encrypted and built with secure pin code access on the product.
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.