Conduct a forensic investigation to recover any pdf files

Assignment Help Software Engineering
Reference no: EM132185579

Lab - Statement of Work Project: Forensic Recovery

1. Project Objectives

With this Statement of Work, LVP is engaging you to conduct a forensic investigation to recover any PDF files deleted from one of its networked workstations. The objectives of this assessment are as follows:

  • Create a digital case file using P2 Commander and index the files on the suspect hard drive. Use your own name as the name of the case file.
  • Recover any deleted PDF files.
  • Generate a report from P2 Commander showing the list of recovered files.

2. Project scope

The scope of the forensic recovery project is as follows: The network-connected workstation named Windows7.

3. Project deliverables

The deliverable(s) for this project are as follows:

a. Proof of indexed drive in a P2 Commander case file

This proof will be provided in the following manner: A screenshot of the P2 Commander window showing the name of the case file and the Root folder structure of the evidenced drive.

b. Proof of the recovered PDF files(s)

This proof will be provided in the following manner: A screenshot showing the name and locations of the recovered files(s).

c. Proof of annotated report

This proof will be provided in the following manner: A screenshot showing the P2 Commander report of the investigation with your notes indicating the name of any recovered file(s).

4. Access to system

We have dedicated a Windows workstation on our internal network (Windows7) for use in your review. From the dedicated machine, you may access the P2 Commander software.

Use the user account provided in the following table to access our network:

System Name

User Name

Password

Window 7

liberty

student

5. Project schedule

All services outlined under the project scope will be completed within two weeks of receiving this statement of Work.

LAB FORENSIC RECOVERY INSTRUCTIONS -

1. Use the lab virtual environment for this assignment where specific instructions for tasks and deliverables are located. After completing the lab, write a lab report that includes all of the required deliverables, screen shots of each operation, and any additional information you gathered.

2. You are also required to include at least one page of written content with a minimum of 2 referenced citations that discusses your findings from each of the lab operations. This can include reasons why the findings are important, actions the organization can take to solve any discovered problems, and any other pertinent information you discovered. This content can be included anywhere in your lab report as long as you meet the one page requirement.

3. Your report must also include Biblical integration that relates a Bible verse, passage, or concept to the assignment. This will count as one of your required citations.

4. APA style references must be included for each citation used.

You can use any tools available to you on the lab system, but keep the focus on recovering deleted files.

Note - Need to complete this assignment using teamviewer.

Attachment:- Assignment Files.rar

Verified Expert

In this assignment we have create project for analysis of p2 commander.in this assignment we have create th case for the liberty company where we have complete the objective of analysis of root physical drive and find out the deleted recovery pdf file and finally create the report of analysis of case studied.

Reference no: EM132185579

Questions Cloud

Importance of aspect of market entry and development : Comment on the importance of this aspect of market entry and development, being sure to discuss the key.
Which other key stakeholders should keith deal with : Which other key stakeholders should Keith deal with? What advice would you give him for dealing with these other key stakeholders?
What roles are played by the shareholders : What roles are played by the shareholders, upper management, and the board of directors in the strategic implementation process?
Importance of control mechanisms : What is the importance of control mechanisms in the strategic implementation process?
Conduct a forensic investigation to recover any pdf files : CSCI 681 Lab-Statement of Work Project: Forensic Recovery. Conduct forensic investigation to recover any PDF files deleted from one of its networked workstation
Importance of communication in workplace : Explain the importance of communication in your workplace.
What challenges does business face in the near future : Select and observe a small business in your area. Do not use a chain or franchise. You should observe the business in person. If you wish, you can also speak.
Kant categorical imperatives regarding prohibitions : Be sure to highlight one of Kant’s categorical imperatives regarding prohibitions, obligations, and permissions in formulating your answers.
What is the estimate to complete : The budget at completion for your project is $600,000. The CPI for your project is 1.25. What is the estimate to complete?

Reviews

len2185579

12/4/2018 8:45:10 PM

I need to complete this assignment using teamviewer with tutor. Use the lab virtual environment for this assignment where specific instructions for tasks and deliverables are located. After completing the lab, write a lab report that includes all of the required deliverables, screen shots of each operation, and any additional information you gathered. You are also required to include at least one page of written content with a minimum of 2 referenced citations that discusses your findings from each of the lab operations. This can include reasons why the findings are important, actions the organization can take to solve any discovered problems, and any other pertinent information you discovered. This content can be included anywhere in your lab report as long as you meet the one page requirement.

len2185579

12/4/2018 8:45:05 PM

Your report must also include Biblical integration that relates a Bible verse, passage, or concept to the assignment. This will count as one of your required citations. APA style references must be included for each citation used. Extra credit sections are not required but, if you complete them, earned points will be used to offset missed sections in the other parts of the lab. You can use any tools available to you on the lab system, but keep the focus on recovering deleted files. Submit this assignment by 11:59 p.m. (ET) on Sunday of Module/Week 7.

len2185579

12/4/2018 8:44:59 PM

Note: Any items not listed here are considered out of scope for this project; the addition of out of scope items to the project scope will not be made without prior approval and authorization from LVP and will be handled through change requests or as separate SOWs. Note: any changes to project objectives or project scope will be handles through change requests or separate SOWs.

Write a Review

Software Engineering Questions & Answers

  Strategy for addressing the associated risk

For each of the three (3) or more malicious attacks and / or threats that you identified in Assignment, choose a strategy for addressing the associated risk (i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance). Explain your..

  Develop the boston consulting group bcg matrix for your

develop the boston consulting group bcg matrix for your selected organization. hospitality outline the products and

  Choose an industry in which two or more companies has

choose an industry in which two or more companies has historically competed to maintain a significant share of the

  According to morgan 2006 all theories of organization and

according to morgan 2006 all theories of organization and management are based on implicit images or metaphors that

  Describe the requirements development process

Describe the requirements engineering/development process. Identify and describe requirements elicitation best practices or techniques.

  Write different entities or objects for engineering firm

List the different entities or objects, logical processes, data flows and data stores that are involved, starting from the time you submitted your time sheet.

  Describe the ordering system to be designed

Describe the ordering system to be designed. Material can be taken from your approved proposal that is submitted to your instructor.

  Software testing environment

Background: Smith Consulting has received some feedback and concerns that their processes and procedures are not sufficiently documented. This lack of professional documentation has caused some loss of potential contracts for the firm.

  Existent for developing a software

What are the various models that are currently existent for developing a software?

  Evaluate the natural settings of the test environment

Evaluate the natural settings of the test environment for Web users. Note: Test environments are usually labs designed to conduct testing. Natural settings refer to the user's normal operating environment

  Identify the model that contains each of derived attributes

Identify the model(s) that contains each of the Aggregation association, Class, Derived attributes, Extends association, Execution occurrence and Guard condition.

  Software testing into statement coverage method

Question in class of software testing and I want you to do it in statement coverage method

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd