Article Review.edited (1)
docx
keyboard_arrow_up
School
University of Notre Dame *
*We aren’t endorsed by this school
Course
6303
Subject
Information Systems
Date
Nov 24, 2024
Type
docx
Pages
4
Uploaded by nkimanzi89
1
Five Anti-Forensic Techniques Used to Cover Digital Footprints
Name
Institution
Course
Instructor
Date
2
Reference Heading
Five Anti-Forensic Techniques Used to Cover Digital Footprints
Author: Computer Forensics
Date Submitted:
Personal Heading:
Name:
Date:
Introduction:
The article "Five Anti-Forensic Techniques Used to Cover Digital Footprints" highlights the
urgent need for digital forensic investigators to traverse new complications as it provides insight
into the ever-changing cyber threat scenario. This article explores anti-forensic strategies to hide
digital footprints and prevent cybercrime detection against Americans who lost over USD 4
billion to cyberattacks in 2020.
Summary of Main Research
The article lists the top five anti-forensic methods, each of which poses different difficulties for
detectives. The analysis is done on disk wiping, file encryption, steganography, compression, and
malware; programs including Drive Wiper, Hidden Tear, and WinZip are shown. These methods
3
are designed to obfuscate or destroy data to hinder forensic analysts from doing their job. Adding
specific tools and their features provides a concrete comprehension of the techniques used by
hackers.
Personal Response
As a cybersecurity student, this essay emphasizes the dynamic nature of digital forensics, which
requires ongoing adaptability to cyber threats. The decision to pursue the EC-Council's
Computer Hacking Forensic Investigator (C|HFI) certification aligns with my professional goals.
It offers a systematic approach to enhancing skills and staying competitive in the rapidly
evolving cybersecurity field. The essay stresses continual learning and promotes the C|HFI
program as a vital tool to combat growing risks.
Conclusion
In conclusion, the paper highlights cyber dangers and gives a practical answer for
professionals looking to improve. Digital forensics is complex, but the article's detailed coverage
of anti-forensic techniques and advice to acquire appropriate certifications make it worthwhile.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
4
References
EC-Council. (n.d.). Anti-Forensic Techniques Used to Cover Digital Footprints.
Retrieved from https://www.eccouncil.org/cybersecurity-exchange/computer-forensics/anti-
forensic-techniques-used-to-cover-digital-footprints/