1.Windows, apple and linux all have different file systems. How does each of them work?
2.What files and logs are forensically interesting when doing an investigation?
3.What metadata can we get from various files? How can it help in an investigation?
4.What techniques might criminals use to hide data or activities?
5.What is special/different about forensic analysis of virtual machines? (NOT WHAT IS A VIRTUAL MACHINE)
6.What is special/different about forensic analysis of cloud based machines? (NOT WHAT IS A CLOUD MACHINE/SYSTEM)
Last Completed Projects
topic title | academic level | Writer | delivered |
---|