How does your technique hinder forensic analysis

Assignment Help Computer Engineering
Reference no: EM131669104

Research Assignment

This is your second, and final research assignment in this course.

Counter forensic activity is becoming increasingly common as the knowledge that digital devices record numerous artifacts to assist investigations is also becoming increasingly common. Often, when the topic of counter forensics comes up in a conversation everyone likes to discuss sophisticated and complex counter forensic techniques such as steganography. However, there are a number of techniques out there that are not only less sophisticated, but can also be interpreted as typical system processes. For example, I just finished a case where windows Disc Defragmenter was used in an attempt to make deleted data unrecoverable.

For this research assignment, do some brief research into counter forensic activity and techniques, choose two techniques that stand out to you as interesting, and writer your paper. Your paper should at a minimum discuss the following for each:

1. What is your technique?
2. How is your technique implemented?
3. How does your technique hinder forensic analysis?
4. Is there a way for examiners to detect or reverse your technique?

As per the syllabus, your research paper should include 12-15 pages of content including an introduction and conclusion. Your work should demonstrate a full understanding of the above topics and should fully explain the concepts associated with each, the purpose for each, how each is applied to the investigations we may someday conduct, and the impact it may have on an investigation should these fundamentals be omitted from the investigative process.

Your paper should be formatted in APA format. If you are not familiar with APA format, I highly recommend Purdue Owl as a resource. For this assignment, I do not restrict the resources which you are able to use, however if you submit a research paper that only has web articles listed as resources it may have a significant impact on your grade!

Please feel free to address any questions in the "Ask the Professor" forum, so that I may address them with the class.

Reference no: EM131669104

Questions Cloud

Create a list of possible deductions for your household : Create a list of possible deductions for your household. Are you able to reduce your taxable income enough to place you in the next lowest tax bracket?
Results of a horse race with three horses : You are tracking the results of a horse race with three horses. 1. PSEUDOCODE: Write the pseudocode that:
Advantages and disadvantages of using a distributed : What are the advantages and disadvantages of using a distributed vs. centralized database design?
True of organizational? structure : Which of the following is true of organizational? structure?
How does your technique hinder forensic analysis : How is your technique implemented? How does your technique hinder forensic analysis? Is there a way for examiners to detect or reverse your technique?
Think again about the workers opportunities : Think again about the workers opportunities. Does their betterment also mean what’s best for your business?
Research security best practices and provide a presentation : It was recently reported that security breaches are on the rise within your small- to medium-sized business network.
Firm on equity markets is measured by which financial? ratio : The attractiveness of a firm on equity markets is measured by which financial? ratio?
Fed into the growth of the american musical theatre : Discuss the various musical idioms (jazz, ragtime, and vaudeville, so forth) that fed into the growth of the American musical theatre.

Reviews

Write a Review

Computer Engineering Questions & Answers

  The importance of the common protocol (tcp/ip)

how the other future communication needs may or may not continue this dependence.

  Write down an object oriented program in java

take a rectangular matrix of cells, each of which can contain an organism. If the matrix is viewed as extending indefinitely in both directions, then each cell has eight neighbors, the eight cells surrounding it.

  Execute a class person with two fields name and age

Execute a class Person with two fields name and age.

  Prepare an isr and startup code for a system

Prepare an ISR and startup code for a system that lights up LED0 on the PSoC Eval1 board (suppose that a wire is connecting P1[0]) to indicate "Low Voltage" whenever there is a supply voltage monitor interrupt.

  Discuss on business performance management

define how Knowledge Management benefits organizations.

  Write down a program that includes a function picnic()

The passed floating-point number represents TOTAL amount of money to be spent on food. The function is to determine the quantity of HOTDOGS, HAMBURGERS,SALAD,PICKLES that can be purchaced, writing these values directly into the respective variable..

  Identify the security provisions

Identify the security provisions

  Questionnbsppart 1-the goal is to design a memory system to

questionnbsppart 1-the goal is to design a memory system to support a small amount of data storage outside of the

  Where are the inputs and outputs of the decoder connected

How many address and data lines are required for a 1M × 16 memory chip?What is the size of a decoder with one chip enable (CE?) to obtain a 64K × 32 memory.

  Define your usage of the mailing list

plan an E-R Diagram showing each entity, its attributes, and it relationships to the other entities. State any assumptions you make. Also Describe your usage of the mailing list, including the dates and subjects of the postings.

  The entire shortest path problem from scratch

How would you verify if this statement is true or false using an efficient algorithm that does not solve the entire shortest path problem from scratch?

  Diagram showing the relationship between ecx and cx

Draw a diagram showing the relationship between ECX, CX, CH, and CL registers.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd