Chapter Objectives
- Digital Forensics Analysis and Validation Data hiding Techniques
- Determine what data to analyze
- Data Validation
Chapter PowerPoint
Reading
Chapter 9
Discussion Board
Based on the techniques discussed for hiding data on a computer, which method would you use for the following:
- Hiding information from a young family member who uses the same computer
- Hiding information from a colleague who is a network administrator
- Hiding information from an intelligence agency, such as the CIA
Hands on Project: Chapter 9
Hand-on Project 9-1
Hand-on Project 9-2:
Case Project: Case Project 9-2
Several graphics files were transmitted via e-mail from an unknown source to a suspect in an ongoing investigation. The lead investigator gives you these graphics file and tells you that at least four messages should be embedded in them. Use your problem solving skills and brainstorming skills to determine a procedure to follow. Write a short report outlining what to do.
Topics and Required Reading
The importance of developmental validation In Forensic Science – https://blog.bizzmine.com/en/the-importance-of-developmental-validation-in-forensic-science
Required Viewing
Chapter 9 Book Video – https://slideplayer.com/slide/7414434/