Tuesday, November 26, 2019
Wear Leveling Example
Wear Leveling Example Wear Leveling ââ¬â Coursework Example Wear leveling as it relates to USB and SSD devices And how it effects the devices as it relates to digital forensics and hashingWear Leveling is a processing technique implemented in a processing unit to restore and mange erasable space in storage media of a computer system. It basically enhances quality of services for SSDs, USB drives in respect to flash memory. However, this technique is used in diverse ways according to the requirement and levels of the flash memory and to improve its durability in respect to the memory space in the unit. It prolongs the service life of memory drives and caters storage issues of temporary memory (Compardo et al, 2014, 309). SSDs and USB have integral flash memories, which can exhaust if the temporal data is written multiple times. Wear leveling technique enables uniform distribution of data writing transversely on other storage media in the system as well, so to prevent data writing on the same place and multiple times. However, Wear leveling alw ays affect secure-erase-programs, as it permanently deletes and modify data on storage devices. Likewise, SSD is fundamentally different from HDD in its structure and functions. It is motionless, can be accessed in less time and has firm resistance against jolt and vibration. However, techniques like wear leveling impact on forensic analysis of SSDs. As, integrally SSD is programmed by wear leveling technique to delete all the temporary data. This makes it impossible to retain deleted data by the digital forensics, whether the memory drive was imaged or write-blocked. Secondly, SSD has this peculiar characteristic to modify its data automatically after it has been imaged, which inaugurates hash value inconsistencies and also becomes a cause of corruption of data. Finally, encoded or encrypted SSD will never allow digital forensics to obtain any significant or meaningful data in the first place (Shimeal & Spring, 2014).à References:Top of FormCampardo, G., Tiziani, F., & Iaculo, M. (2014).à Memory Mass Storage. Berlin: Springer Berlin.Top of FormShimeall, T., & Spring, J. M. (2014).à Introduction to information security: A strategic-based approach.Bottom of FormBottom of Form
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.