0% found this document useful (0 votes)
10 views5 pages

Cie-I (Chfi)

Uploaded by

vilas40574
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views5 pages

Cie-I (Chfi)

Uploaded by

vilas40574
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

1. What do you understand by Bad Sector/ Cluster?

A bad sector in computing is a disk sector on a disk storage unit that is unreadable. Upon
taking damage, all information stored on that sector is lost. When a bad sector is found
and marked, the operating system like Windows or Linux.
A bad sector on a hard drive is simply a tiny cluster of storage space -- a sector -- of the
hard drive that appears to be defective. The sector won't respond to read or write requests.
Bad sectors can occur on both traditional magnetic hard drives and modern solid-state
drives. There are two types of bad sectors -- one resulting from physical damage that can't
be repaired, and one resulting from software errors that can be fixed.
Types of Bad Sectors: -
There are two types of bad sectors -- often divided into "physical" and "logical" bad
sectors or "hard" and "soft" bad sectors.
Physical (Hard) Bad Sectors:
 Constitutes a cluster of storage on the hard drive with physical impairment.
 Damage can stem from head contact, dust accumulation, flash memory cell wear
in solid-state drives, or other defects.
 Irreparable in nature, rendering the sector unusable.
Logical (Soft) Bad Sectors:
 Encompasses a cluster of storage encountering functionality issues.
 Occurs when the operating system reads data from the sector and detects
inconsistencies in the error-correcting code (ECC) against its contents.
 Repairable by overwriting the drive with zeros or performing a low-level format.
Windows' Disk Check tool also aids in repairing such bad sectors.

2. What is Computer Forensic?


Cyber forensics is a process of extracting data as proof for a crime (that involves
electronic devices) while following proper investigation rules to nab the culprit by
presenting the evidence to the court. Cyber forensics is also known as computer forensics.
The main aim of cyber forensics is to maintain the thread of evidence and documentation
to find out who did the crime digitally. Cyber forensics can do the following:
 It can recover deleted files, chat logs, emails, etc
 It can also get deleted SMS, Phone calls.
 It can get recorded audio of phone conversations.
 It can determine which user used which system and for how much time.
 It can identify which user ran which program.
Importance of Cyber Forensics –
 Cyber forensics helps in collecting important digital evidence to trace the criminal
 It is also helpful for innocent people to prove their innocence via the evidence
collected online.
 It is not only used to solve digital crimes but also used to solve real-world crimes
like theft cases, murder, etc.
 Businesses are equally benefitted from cyber forensics in tracking system
breaches and finding the attackers.

3. Write a short note on Bit-Shifting.


Bit-shifting is a fundamental technique employed in cyber forensics to analyze and
extract valuable information from binary data. In the realm of digital investigations,
where understanding the underlying structure of data is crucial, bit-shifting plays a pivotal
role.
Bit-shifting involves moving individual bits within a binary data stream to the left or
right, effectively altering their positions and values. This technique is employed for
various purposes, including data recovery, encryption analysis, and malware detection.
In cyber forensics, bit-shifting finds application in tasks such as:
 Data Reconstruction: Bit-shifting aids in recovering altered, hidden, or damaged
data within digital artifacts by manipulating bits to unveil hidden patterns.
 Steganography Detection: By identifying shifts in bit patterns, bit-shifting helps
uncover concealed data hidden within seemingly innocent files, exposing covert
messages and potential threats.
 Malware Analysis: Bit-shifting assists in decoding malicious routines, identifying
obfuscated components, and understanding malware's inner workings by
dissecting binary instructions.
 Password Recovery: Bit-shifting can try various combinations to aid in
recovering encrypted data or passwords, facilitating sensitive information
retrieval.
 File Header Analysis: Bit-shifting identifies anomalies or hidden data within file
headers, aiding in detecting tampering or disguised files by analyzing essential
metadata.
 Hash Comparison: Bit-shifting detects changes or similarities in hashed data,
assisting in verifying data integrity through hash comparison techniques.

4. What are different types of Digital Forensics?


Explain.
There are multiple types of computer forensics depending on the field in which digital
investigation is needed. The fields are:
 Network forensics: This involves monitoring and analysing the network traffic to
and from the criminal’s network. The tools used here are network intrusion
detection systems and other automated tools.
 Email forensics: In this type of forensics, the experts check the email of the
criminal and recover deleted email threads to extract out crucial information
related to the case.
 Malware forensics: This branch of forensics involves hacking related crimes.
Here, the forensics expert examines the malware, trojans to identify the hacker
involved behind this.
 Memory forensics: This branch of forensics deals with collecting data from the
memory (like cache, RAM, etc.) in raw and then retrieve information from that
data.
 Mobile Phone forensics: This branch of forensics generally deals with mobile
phones. They examine and analyse data from the mobile phone.
 Database forensics: This branch of forensics examines and analyses the data
from databases and their related metadata.
 Disk forensics: This branch of forensics extracts data from storage media by
searching modified, active, or deleted files.

5. How we identify Graphics File Fragments?


In computer graphics, the stage that converts pixel fragments into final pixels for the
frame buffers. Programmable fragment processors are the last programmable stage in the
graphics pipeline. Also known as "pixel shaders."

File carving is a forensic technique to recover files from storage media without
relying on file system information. It's used to extract data in digital investigations,
especially from unallocated space. Initially called "design," it involves analyzing the
structure of files within raw data, often used to recover data in cases like the Osama
Bin Laden camp raid.
In digital investigations, various storage devices and memory are analyzed, including
emails, reports, logs, and media files. File carving recovers file contents and structure
without metadata. Key terms include:
 Block: Smallest storage data unit.
 Header: File's start points.
 Footer: File's end bytes.
 Fragment: Blocks forming a file.
 Base-fragment: First fragment with the header.
 Fragmentation point: Block before fragmentation. Multiple fragments create
several points.

6. Define the Image Formats.


Image formats describe how image data is stored, and they can be compressed,
uncompressed, or vector-based. Image formats play a crucial role in how visual data is
stored, shared, and displayed across various devices and platforms. Each format has its
own characteristics, advantages, and use cases, making it essential to understand their
differences for effective image management. Different formats have advantages and
disadvantages:
 TIFF (.tif, .tiff): Tagged Image File Format stores images without compression,
resulting in high quality but large file sizes, suitable for printing and professional
use.
 JPEG (.jpg, .jpeg): Joint Photographic Experts Group format is lossy, compressing
images while retaining good quality, making it common for digital cameras,
presentations, and web use.
 GIF (.gif): Graphics Interchange Format is used for web graphics, often animated,
and limited to 256 colors with transparency support.
 PNG (.png): Portable Network Graphics is a lossless format supporting 16 million
colors, aiming to replace GIF for web use.
 Bitmap (.bmp): Bit Map Image, similar to TIFF, is lossless and uncompressed,
mainly used for Windows systems.
 EPS (.eps): Encapsulated PostScript is a vector format suitable for software like
Adobe Illustrator.
 RAW Image Files (.raw, .cr2, .nef, .orf, .sr2): Unprocessed files from cameras or
scanners, containing rich image information that requires processing in software
like Adobe Photoshop or Lightroom.

7. What are two different types of Compression?


Image compression reduces file size without compromising image quality, benefiting
storage and data transmission efficiency. Two main compression types exist: lossy and
lossless.
Compression is a technique used to reduce the size of data or media files while aiming to
maintain their essential content and quality. It plays a pivotal role in various fields,
including data storage, multimedia transmission, and digital communication.
Lossy Compression:
 Reduces image file size by permanently removing less critical information and
redundant data.
 Significantly decreases file size, but excessive compression can distort the image.
 Used when balancing image quality and file size is critical.
 Commonly applied to web images, digital photography, and multimedia.
Lossless Compression:
 Reduces file size without sacrificing image quality by maintaining all critical data.
 Compressed images can be fully restored without degradation.
 Offers less file size reduction compared to lossy compression.
 Preferred when retaining high-quality images is essential, such as product images
or artwork.
Comparison:
 Data Compression: Reduces data size without loss of information.
 Lossy Compression: Sacrifices some image data for higher compression.
 Lossless Compression: Maintains image quality while reducing size.
 Lossy doesn't fully restore original data, lossless does post-decompression.

8. Differentiate between Lossy and Lossless


Compression.

You might also like