Handling Data Security in Education
DOI:
https://doi.org/10.62416/ijwb-41Keywords:
Hard drives, Digital forensics, FTK Imager, Autopsy, Data confidentialy, EducationAbstract
Digital forensics is a new science and follows the rapid changes in the computer environment, expanding into many disciplines, which turns it into a very challenging field that requires the continuous development of methodologies and tools to counter the ever-newer changes in cybercrime. The research subject refers to the analysis and challenges of digital forensics, tracking of hard drives, recovery of deleted files from the hard drive, their quality after recovery, and the possibility of creating forensic images on physically damaged hard drives. The research is based on digital forensics and tracking of all hard drives by creating digital images and analyzing forensic images FTK Imager and Autopsy 4.15.0. The research concludes that the number of files allocated to a forensic image does not play a role in the duration of report generation during the creation of forensic images using FTK Imager. Unlike allocated files, unanalyzed files in a forensic image are directly proportional to the duration of generating reports for forensic images through FTK Imager. Also, in conclusion, it is worth noting that FTK Imager cannot generate a forensic image when the hard drive is physically damaged. This research paper investigates the integral relationship between data security and data recovery even after deletion, highlighting the importance of digital forensics in hard drive security management to protect sensitive information and maintain regulatory compliance, which should also find the right place in education. Educational institutions must balance early education on data permanence and recovery with ensuring students have foundational digital knowledge before introducing complex security concepts.
References
Alexander, Brandon (2022). Evaluation of Open-Source & Proprietary Forensic Software Tools. ISSC621: Computer Forensics. APUS. DOI: 10.13140/RG.2.2.3484416006
Arnes, A. (2018). Digital Forensics. John Wiley & Sons Inc.
Boddington, R. (2016). Practical Digital Forensics. Packt Publishing Ltd.
Breitinger, C. G., & Baggili, I. (2017). Availability of Datasets for Digital Forensics–and What is Missing. Cyber Forensics Research and Education Group (UNHcFREG), Tagliatela College of Engineering, ECECS, University of New Haven, 300 Boston Post Rd., Westhaven, CT 06516, USA.
Digital Corpora. (2019). Accessed 04 22, 2019 [Online] Available at: https://digitalcorpora.org/corpora/disk-images/real-data-corpus
Digitalcorpora.org. (2021). Accessed 06 30, 2021 [Online] Available at: https://digitalcorpora.org/corpora/disk-images/real-data-corpus
Du, X., Ledwith, P., & Scanlon, M. (2018). Deduplicated Disk Image Evidence Acquisition and Forensically-Sound Reconstruction. 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications (pp. 1674-1679). 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE).
EC-Council. (2009). Computer Forensics: Hard Disk and Operating Systems, Volume 2. Cengage Learning.
Frauenhoffer, M. (2018). Medium. Retrieved 08 11, 2020 [Online], Available at: https://medium.com/@Frauenhoffer/how-to-create-a-forensic-image-with-ftk-imager-6fb8ee07fb2d
Hassan, N. A. (2019). Digital Forensics Basic. New York: Apress.
http://sleuthkit.org/. (2021). Accessed 06 30, 2021 [Online] Available at: https://sleuthkit.org/autopsy/docs/user-docs/3.1/quick_start_guide.html
Kent, K., Chevalier, S., Grance, T., & Dang, H. (2006). Guide to Integrating Forensic Techniques into Incident Response. Retrieved from Special Publication (NIST SP), National Institute of Standards and Technology, Gaithersburg, MD: https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=50875
Moch, C., & Freiling, F. C. (2009). The Forensic Image Generator Generator (Forensig2). In IT Security Incident Management and IT Forensics, 2009. IMF’09, Fifth International Conference. IEEE, 78-93.
Muneesawang, P., & Yammen, S. (2015). Visual Inspection Technology in the Hard Disk Drive Industry. ISTE Ltd and John Wiley & Sons, Inc.
Nelson, B., Phillips, A., & Steuart, C. (2019). Guide to Computer Forensics and Investigations: Processing Digital Evidence. 2019, 2016 Cengage Learning, Inc.
Prakash, N., & Duhan, D. R. (2020). COMPUTER FORENSIC INVESTIGATION PROCESS AND JUDICIAL RESPONSE TO THE DIGITAL EVIDENCE IN INDIA IN LIGHT OF RULE OF BEST EVIDENCE. International Journal in Management and Social Science, Volume 08, Issue 05.
Prasanthi, B. V. (2016). Cyber Forensic Tools: A Review. International Journal of Engineering Trends and Technology (IJETT) – Volume-41 Number-5.
Salunkhe, P., Bharne, S., & Padiya, P. (2016). Data analysis of file forensic investigation. International Conference on Signal Processing, Communication, Power and Embedded Systems (SCOPES), 372-375.
Sammons, J. (2012). Forensics, The Basics of Digital: the primer for getting started in digital forensics. Syngress is an imprint of Elsevier.
Solodov, D., & Solodov, I. (2021). Data recovery in the case of fire-damaged Hard Disk Drives and Solid-State Drives. Forensic Science International: Reports
Yannikos, Y., Graner, L., Steinebach, M., & Winter, C. (2014). Data Corpora for Digital Forensics Education and Research. In IFIP International Conference on Digital Forensics, (pp. 309–325). Springer.
Zbrog, Matt (2024). A GUIDE TO DIGITAL FORENSICS AND CYBERSECURITY TOOLS. Accessed 07 16, 2024 [Online] Available at: https://www.forensicscolleges.com/blog/resources/guide-digital-forensics-tools
Zlatanov, N. (2015). Hard Disk Drive and Disk Encryption. Black Hat. Amsterdam: IEEE Computer Society.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 Deshira Imeri Saiti- Mentor Hamiti- Jehona Asani
This work is licensed under a Creative Commons Attribution 4.0 International License.