Search icon
Arrow left icon
All Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Newsletters
Free Learning
Arrow right icon
Big Data Forensics: Learning Hadoop Investigations

You're reading from  Big Data Forensics: Learning Hadoop Investigations

Product type Book
Published in Aug 2015
Publisher
ISBN-13 9781785288104
Pages 264 pages
Edition 1st Edition
Languages
Concepts

Validating application collections


Collecting application data requires a different form of information for validation. Validating a collection involves proving the following:

  • The collection was performed correctly and completely

  • The collected data is a replica of the source system's data

Unlike file-based collection methods, record-based collections compiled through an application are not typically validated with hash values. Hash values are useful for proving that data was not modified and that the collection was performed correctly. Supplemental information (for example, collection logs) is used to prove that the collection was performed completely. The use of hash values, however, is not always appropriate for application collections. There are several reasons why hash values are not used to validate application collections:

  • It is not necessary to calculate hash values because of the absence of metadata or other artifacts that are collected

  • Large data volumes make computing hash values infeasible...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $15.99/month. Cancel anytime}