Solved

Digital Forensics

Posted on 2011-09-11
5
285 Views
Last Modified: 2012-05-12
Hi

can some one explain in details what the differences between Bit Stream Copy and Bit Stream image ? please don't just post links. i Google them but the definition on the internet quite confused ???


thanks
0
Comment
Question by:ang3lus
  • 2
  • 2
5 Comments
 
LVL 37

Assisted Solution

by:Gerwin Jansen
Gerwin Jansen earned 40 total points
Comment Utility
Hi, where did you find your definitions? When I read both, 'bit stream copy' would refer to the process and 'bit stream image' in the result. Otherwise said, a bit stream copy method would give you a bit stream image. I also read about mirror or ghost images that do not always produce a forensic image of a drive as the applications used to create them may leave out not used sectors for example.
0
 
LVL 5

Accepted Solution

by:
ChopOMatic earned 85 total points
Comment Utility
While I don't know where you're pulling the jargon from and thus don't have any context, as a fulltime digital forensic geek, I can share the following:

As I've heard it used most commonly over the years, the terms "bitstream copy" and "bitstream image" usually refer to exactly the same thing, that being what I prefer to call a forensic image. Either could be used to describe the process of creating the forensic image, ie. used as a verb. Either could also be used to describe the resulting forensic image, ie. used as a noun.

A forensic image is a file that contains an exact duplicate of the dataset from the source device. Every binary bit of data is copied, hence the term "bitstream." This process captures not only active files, but slack space, unallocated space, hidden files, etc.

Hope this helps...

Chop
0
 

Author Comment

by:ang3lus
Comment Utility
First, thanks

Second, these defintions  that i found:

- A bit-stream image is a sector-by-sector / bit-by-bit copy of a hard drive. A bit-stream image is actually a set of files that can be used to create an exact copy of a hard drive, preserving all latent data in addition to the files and directory structures.  


- Bitstream Copying—is more commonly known as "backing up your data," and refers to the process of making an exact duplicate of a digital object. Though a necessary component of all digital preservation strategies, bitstream copying in itself is not a long-term maintenance technique, since it deals only with the question of data loss due to hardware and media failure, whether resulting from normal malfunction and decay, malicious destruction or natural disaster. Bitstream copying is often combined with remote storage so that the original and the copy are not subject to the same disastrous event.  <<http://www.icpsr.umich.edu/dpm/dpm-eng/terminology/strategies.html>>
0
 
LVL 5

Expert Comment

by:ChopOMatic
Comment Utility
They say basically the same thing as we did, but in much more confusing language. :)
0
 

Author Closing Comment

by:ang3lus
Comment Utility
thanks
0

Featured Post

Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

Join & Write a Comment

Suggested Solutions

Title # Comments Views Activity
Downloaded executable in windows 7 & XP 2 559
IE/Chrome Logs on windows 7 laptop 3 149
Need public domain images 7 80
print logs windows 7 3 34
The foremost challenge encountered by an investigator at the very beginning of a forensics investigation is, accessing a file/data to read/view its contents. Owing to the fact, a platform is necessary for both; opening as well as examining any file.…
In this era, as you know, cybercrime and other sorts of frauds using the internet has increased day by day. We should protect our information assets and confidential information from getting exploiting by the attacker or intruders. Most of the fraud…
Access reports are powerful and flexible. Learn how to create a query and then a grouped report using the wizard. Modify the report design after the wizard is done to make it look better. There will be another video to explain how to put the final p…
This video demonstrates how to create an example email signature rule for a department in a company using CodeTwo Exchange Rules. The signature will be inserted beneath users' latest emails in conversations and will be displayed in users' Sent Items…

772 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

10 Experts available now in Live!

Get 1:1 Help Now