In the event that software or hardware fails or you experience a problem when making an acquisition, you should have backup plans ready.
The most common and time-consuming technique for preserving evidence is creating a duplicate of your disk-to-image file.
Make sure you take action to reduce the possibility that your investigation may fail.
Certain acquisition tools don't copy data from a disk drive's host-protected area (HPA). To determine whether a vendor's tool can duplicate a drive's HPA, consult the documentation.
You need to have a plan for dealing with encrypted disks as part of your contingency preparation.
The majority of full disk encrypted disks now require the user's assistance in providing the decryption key in order to be decrypted prior to static acquisition.
The majority of entire disk encryption tools at least feature a manual decryption procedure that involves converting the encrypted disk to an unencrypted disk. Depending on the size of the disk, this operation could take a few hours.
\
RAID 0: Provides rapid access and increased data storage. Two or more disk drives become one large volume, so the computer views the disks as a single disk.
RAID 1: Made up of two disks for each volume and is designed for data recovery in the event of a disk failure.
RAID 2: Provides rapid access and increased storage by configuring two or more disks as one large volume.
RAID 3: Uses data striping and dedicated parity and requires at least three disks.
RAID 4: Uses data striping and dedicated parity (block writing), except data is written in blocks rather than bytes.
RAID 5: Uses distributed data and distributed parity and stripes data tracks across all disks in the RAID array. It places parity data on each disk. I
RAID 6: Distributed data and distributed parity (double parity) function the same way as RAID 5, except each disk in the RAID array has redundant parity.
RAID 10: A combination of RAID 1 and RAID 0. It provides fast access and redundancy of data storage. Also known as Mirrored Striping.
RAID 15: A combination of RAID 1 and RAID 5. It offers the most robust data recovery capability and speed of access to all RAID configurations and is also more costly. Also known as Mirrored Striping with Parity.
</p>
There’s no simple method for getting an image of a RAID server’s disks. You need to address the following concerns:
How much data storage is needed to acquire all data for a forensics image?
What type of RAID is used? Is it Windows RAID 0 or 1 or an integrated hardware- firmware vendor’s RAID 5, 10, or 15? Is it another unknown configuration or OS?
If it’s a RAID 1, 10, or 15 server, do you need to have all drives connected so that the OS sees their contents? Some older RAID 1 systems required connecting both drives to make the data readable, which might also apply to RAID 10 and 15.
Do you have an acquisition tool capable of copying the data correctly?
Can the tool read a forensic copy of a RAID image?
Can the tool read split data saves of each RAID disk, and then combine all images of each disk into one RAID virtual drive for analysis?
</p>
The following are some vendors offering RAID acquisition functions:
\
\
The following security features are available for remote connections:
</p>
\