Describe the digital forensics practices

Assignment Help Computer Engineering
Reference no: EM132186833

Question: You are a technician in the information technology (IT) department of an Internet startup. One of your colleagues recently downloaded three files onto his laptop-a .doc file, a .jpg file, and an .mp4 file-which he accidentally deleted. He now urgently needs these files to complete a time-sensitive task and has asked you to help him recover the lost data.

Tasks: To recover the lost data:

1. See attached file to download the following files to your desktop:

• AU_IST344_M3A2L1.doc

• AU_IST344_M3A2L1.jpg

• AU_IST344_M3A2L1.mp4

2. Visit cnet.com and search for "data recovery" software, indicating whether you are using a Windows or Mac computer.

3. Review the list of data recovery software.

4. Select the two programs you feel are the best; base your decision on any criteria of your choice, but consider those programs that have the largest number of downloads or the highest user reviews.

5. Install both software programs onto your desktop or laptop computer. Make sure to not install additional software or add-ons packaged with the program.

6. Delete all three of the files you downloaded to your desktop in the first step (AU_IST344_M3A2L1.doc, AU_IST344_M3A2L1.jpg, AU_IST344_M3A2L1.mp4); ensure that your Recycle Bin is empty and the files no longer exist on your computer.

7. Open and run the first of the two data-recovery software programs; check to see which of the three files from this syllabus were recoverable.

8. Open and run the second of the two data-recovery software programs; check to see which of the three files from this syllabus were recoverable.

9. Write a 3- to 4-page reflection in which you address each of the tasks below:

• Define and describe the digital forensics practices that you used to complete this exercise.

• Describe your methods of handling the digital forensics evidence that you used in this exercise.

• Explain why you chose the two data-recovery programs you selected.

• Illustrate how you used the digital forensics tools you downloaded to locate, recover, and identify the three digital files.

• Critique your success (or failure) when attempting to recover the three digital files.

• Provide solutions for data recovery techniques and suggest tools to use.

• Explain how you can apply this skill in the future.

Note: Your final product should be a 3- to 4-page Microsoft Word document, using four to six scholarly sources beyond your course textbook. Write in a clear, concise, and organized manner; demonstrate ethical scholarship in the accurate representation and attribution of sources (APA); and display accurate spelling, grammar, and punctuation.

Information related to above question is enclosed below:

Attachment:- Files Link.rar

Reference no: EM132186833

Questions Cloud

Create a flyer for patrons using given information : You're working for a local coffee shop that offers free wireless access to customers. Your supervisor has asked you to create a flyer for patrons.
Create and maintain a positive home-school partnership : How, from the perspective of your professional role, you communicate with families on a weekly basis.
Compute the dividend refund : Compute the dividend refund for 2018 and the amount of any RDTOH to be carried forward - Compute the federal Part I tax and provincial tax
How you would connect with the families at this school : Define the relationship between the struggles of parents and the struggles of their children. Defend your response.
Describe the digital forensics practices : Define and describe the digital forensics practices that you used to complete this exercise. Describe your methods of handling the digital forensics evidence.
Discuss how the flipped classroom idea can be used : Discuss if a school or teacher should use a multimedia resource that is absolutely amazing in delivering both content and assessment, but is not accessible.
Writes the limericks out to a file : How do you make a python function which accepts one string parameter of two limericks in one variable, writes the limericks out to a file and returns the count
Examine misconceptions about culture : Apply cultural relativism in order to examine misconceptions about culture that may occur due to ethnocentrism.
Data about one person or item makes : 1-All of the data about one person or item makes up a:

Reviews

Write a Review

Computer Engineering Questions & Answers

  How use cases will be used by the project team

Explain, in clear, nontechnical terms, how use cases will be used by the project team. Explain what these models are, what they represent in the system, and how they will be used by the team.

  Find out what tasks are assigned to each phase

A project includes Analysis, Definition, Design, Implementation, Maintenance, and Support phases. How do we determine what tasks are assigned to each phase.

  What height of base station antenna would be necessary

What height of base station antenna would be necessary to provide a service area of radius 10 km? What realistic options are there for increasing service area?

  Why is that important for you to understand

SQL is often presented a a single database language, but some contend that it is a set of languages.

  Questionone of compensation to writing a program that is

questionone of compensation to writing a program that is subdivided into modules is that such a structure allows unlike

  Describe the physical meaning of controllability

In order to effecte a complete controller design, a system must be controllable. Describe the physical meaning of controllability.

  Analyzing the business case

We require a corporate goal for SCR which refers to our new training activity. Construct a draft to show Jesse. Jesse wants my opinion on whether or not SCR requires a systems review committee. Need to prepare a recommendation and the reasons.

  Design an asynchronous bus interface

The 68000 uses a R/W* output to indicate a read or a write cycle. An alternative is to employ separate RE* (read) and WE* (write) strobes.

  Write a detailed algorithm of the approximation algorithm

Write a detailed algorithm of the approximation algorithm for the Bin-Packing problem given in Section 9.5.2, and show that its time complexity is in T(n2).

  How is the logical-to-physical address

How is logical-to-physical address mapping accomplished in this system? (For the indexed allocation, assume that a file is always less than 512 blocks long.)

  Write a return statement to complete the function definition

Function double takes a number and returns twice its value. Write a return statement to complete the function definition.

  What are the two required attributes of an img element

What does the code element specify for its content? What are the two required attributes of an img element? What is the purpose of the alt attribute of img?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd