Describe the digital forensics practices

Assignment Help Computer Engineering
Reference no: EM132186833

Question: You are a technician in the information technology (IT) department of an Internet startup. One of your colleagues recently downloaded three files onto his laptop-a .doc file, a .jpg file, and an .mp4 file-which he accidentally deleted. He now urgently needs these files to complete a time-sensitive task and has asked you to help him recover the lost data.

Tasks: To recover the lost data:

1. See attached file to download the following files to your desktop:

• AU_IST344_M3A2L1.doc

• AU_IST344_M3A2L1.jpg

• AU_IST344_M3A2L1.mp4

2. Visit cnet.com and search for "data recovery" software, indicating whether you are using a Windows or Mac computer.

3. Review the list of data recovery software.

4. Select the two programs you feel are the best; base your decision on any criteria of your choice, but consider those programs that have the largest number of downloads or the highest user reviews.

5. Install both software programs onto your desktop or laptop computer. Make sure to not install additional software or add-ons packaged with the program.

6. Delete all three of the files you downloaded to your desktop in the first step (AU_IST344_M3A2L1.doc, AU_IST344_M3A2L1.jpg, AU_IST344_M3A2L1.mp4); ensure that your Recycle Bin is empty and the files no longer exist on your computer.

7. Open and run the first of the two data-recovery software programs; check to see which of the three files from this syllabus were recoverable.

8. Open and run the second of the two data-recovery software programs; check to see which of the three files from this syllabus were recoverable.

9. Write a 3- to 4-page reflection in which you address each of the tasks below:

• Define and describe the digital forensics practices that you used to complete this exercise.

• Describe your methods of handling the digital forensics evidence that you used in this exercise.

• Explain why you chose the two data-recovery programs you selected.

• Illustrate how you used the digital forensics tools you downloaded to locate, recover, and identify the three digital files.

• Critique your success (or failure) when attempting to recover the three digital files.

• Provide solutions for data recovery techniques and suggest tools to use.

• Explain how you can apply this skill in the future.

Note: Your final product should be a 3- to 4-page Microsoft Word document, using four to six scholarly sources beyond your course textbook. Write in a clear, concise, and organized manner; demonstrate ethical scholarship in the accurate representation and attribution of sources (APA); and display accurate spelling, grammar, and punctuation.

Information related to above question is enclosed below:

Attachment:- Files Link.rar

Reference no: EM132186833

Questions Cloud

Create a flyer for patrons using given information : You're working for a local coffee shop that offers free wireless access to customers. Your supervisor has asked you to create a flyer for patrons.
Create and maintain a positive home-school partnership : How, from the perspective of your professional role, you communicate with families on a weekly basis.
Compute the dividend refund : Compute the dividend refund for 2018 and the amount of any RDTOH to be carried forward - Compute the federal Part I tax and provincial tax
How you would connect with the families at this school : Define the relationship between the struggles of parents and the struggles of their children. Defend your response.
Describe the digital forensics practices : Define and describe the digital forensics practices that you used to complete this exercise. Describe your methods of handling the digital forensics evidence.
Discuss how the flipped classroom idea can be used : Discuss if a school or teacher should use a multimedia resource that is absolutely amazing in delivering both content and assessment, but is not accessible.
Writes the limericks out to a file : How do you make a python function which accepts one string parameter of two limericks in one variable, writes the limericks out to a file and returns the count
Examine misconceptions about culture : Apply cultural relativism in order to examine misconceptions about culture that may occur due to ethnocentrism.
Data about one person or item makes : 1-All of the data about one person or item makes up a:

Reviews

Write a Review

Computer Engineering Questions & Answers

  What field did you explore in the class

What field did you explore in this class, that makes this true? Why? What field did you explore that indicates this couldn't be further from the truth? Why?

  Compare the heat-transfer coefficients for the wire

Consider the free-convection cooling of a thick, square plate of copper with one surface exposed to air and the other surfaces insulated.

  What required to be considere an effective computer language

Discuss with Sally what is required to be considered an effective computer language. Suggest three characteristics that make up an effective computer language. Support your response with evidence from the textbook or an article you found.

  How to design a class and a program

create a class and a program that creates an object of the class and prompts the user to enter the name, type, and age of his or her pet. This data should be stored in the object. Use the object's accessor method to retrieve the pet's name, type, ..

  Largest solution to the quadratic equation

In case, the value of "b squared" 4ac is negative, then code prints out the message "no real solutions" and returns. On the other hand, the function prints out the largest solution to quadratic equation.

  What are the characteristics of the adt queue

What are the characteristics of the ADT queue? Which of the following is true of stacks and queues? A stack is a last-in, first-out structure.

  Describe a method for notifying the systems administrator

write 500 words for each of the discussion tasks. you should provide credible references for every task according to

  Find percentage of the total votes received by candidate

write down a program that allows the user to enter the last names of five candidates in a local election and the votes received by each candidate. The program should then output each candidates name, the votes received by that candidate, and the p..

  Define how is the tours content and function

What technologies are used to create the experince in tours memorable?

  Describe and discuss some of the issues you had while

describe and discuss some of the issues you had while configuring your machine and environment to meet the requirements

  Build a program that schedules simulated CPU jobs

Build a program that schedules simulated CPU jobs. Your program should run in a loop, each iteration of which corresponds to a time slice for the CPU.

  Explain the following statements as logic expressions

Please state the following statements as logic expressions.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd