Digital Evidence Recovery: Personal Computers, USB Drives, and Computer Disks

Digital forensic investigators are often tasked with locating and examining digitally-held data during a case investigation. However, various devices can be found at the scene, meaning that each information storage unit must be analyzed according to its technical characteristics (Angelopoulou et al., 2016). For instance, personal computers, USB drives, and computer disks are the most frequently encountered digital devices that might contain useful information for investigators.

To appropriately examine the digital computer data, the researcher must overcome the challenges connected to the evaluation of this particular device. Personal computers and laptops may be protected by passwords, unique codes, or other methods of preserving the information contained. Furthermore, computers can also have programs or applications that delete data when an intrusion is sighted, meaning that an uncareful approach to information collection can cause the destruction of available files (Muraski & Knetzger, 2007). However, to recover the data more efficiently, the investigator might use protection removal programs to avoid damaging the data or causing malfunctions due to forced entry.

When handling USB drives, similar complications can be encountered, as USB drives might also be password-protected to prevent unauthorized access. However, it is also possible that the device might be corrupted, which can tremendously hinder the process of extracting the original data in full (Muraski & Knetzger, 2007). To improve the data analysis, an investigator could use specific programs or equipment that modify the device’s protection and remove present hazards.

Finally, computer disks can also cause obstacles during a digital investigation. As laser disks, such as CDs or DVDs, are less frequently used in the current age, their format might not be compatible with modern storage systems or applications (Angelopoulou et al., 2016). In addition, such items are easily damaged due to their fragility, and previously incurred cuts may cause the disk to become unreadable. Therefore, to avoid potential issues, the investigator may convert the contained files into a more appropriate format or remove the scratches using a solution.

References

Angelopoulou, O., Vidalis, S., & Jones, A. (2016). Extracting intelligence from digital forensic artifacts. 15th ECCWS: European Conference on Information Warfare and Security.

Muraski, J., & Knetzger, M. (2007). Investigating high-tech crime, vitalsource for Kaplan University. Pearson Learning Solutions.

Cite this paper

Select style

Reference

StudyCorgi. (2022, December 24). Digital Evidence Recovery: Personal Computers, USB Drives, and Computer Disks. https://studycorgi.com/digital-evidence-recovery-personal-computers-usb-drives-and-computer-disks/

Work Cited

"Digital Evidence Recovery: Personal Computers, USB Drives, and Computer Disks." StudyCorgi, 24 Dec. 2022, studycorgi.com/digital-evidence-recovery-personal-computers-usb-drives-and-computer-disks/.

* Hyperlink the URL after pasting it to your document

References

StudyCorgi. (2022) 'Digital Evidence Recovery: Personal Computers, USB Drives, and Computer Disks'. 24 December.

1. StudyCorgi. "Digital Evidence Recovery: Personal Computers, USB Drives, and Computer Disks." December 24, 2022. https://studycorgi.com/digital-evidence-recovery-personal-computers-usb-drives-and-computer-disks/.


Bibliography


StudyCorgi. "Digital Evidence Recovery: Personal Computers, USB Drives, and Computer Disks." December 24, 2022. https://studycorgi.com/digital-evidence-recovery-personal-computers-usb-drives-and-computer-disks/.

References

StudyCorgi. 2022. "Digital Evidence Recovery: Personal Computers, USB Drives, and Computer Disks." December 24, 2022. https://studycorgi.com/digital-evidence-recovery-personal-computers-usb-drives-and-computer-disks/.

This paper, “Digital Evidence Recovery: Personal Computers, USB Drives, and Computer Disks”, was written and voluntary submitted to our free essay database by a straight-A student. Please ensure you properly reference the paper if you're using it to write your assignment.

Before publication, the StudyCorgi editorial team proofread and checked the paper to make sure it meets the highest standards in terms of grammar, punctuation, style, fact accuracy, copyright issues, and inclusive language. Last updated: .

If you are the author of this paper and no longer wish to have it published on StudyCorgi, request the removal. Please use the “Donate your paper” form to submit an essay.