Describe the digital forensics practices

Assignment Help Computer Engineering
Reference no: EM132186833

Question: You are a technician in the information technology (IT) department of an Internet startup. One of your colleagues recently downloaded three files onto his laptop-a .doc file, a .jpg file, and an .mp4 file-which he accidentally deleted. He now urgently needs these files to complete a time-sensitive task and has asked you to help him recover the lost data.

Tasks: To recover the lost data:

1. See attached file to download the following files to your desktop:

• AU_IST344_M3A2L1.doc

• AU_IST344_M3A2L1.jpg

• AU_IST344_M3A2L1.mp4

2. Visit cnet.com and search for "data recovery" software, indicating whether you are using a Windows or Mac computer.

3. Review the list of data recovery software.

4. Select the two programs you feel are the best; base your decision on any criteria of your choice, but consider those programs that have the largest number of downloads or the highest user reviews.

5. Install both software programs onto your desktop or laptop computer. Make sure to not install additional software or add-ons packaged with the program.

6. Delete all three of the files you downloaded to your desktop in the first step (AU_IST344_M3A2L1.doc, AU_IST344_M3A2L1.jpg, AU_IST344_M3A2L1.mp4); ensure that your Recycle Bin is empty and the files no longer exist on your computer.

7. Open and run the first of the two data-recovery software programs; check to see which of the three files from this syllabus were recoverable.

8. Open and run the second of the two data-recovery software programs; check to see which of the three files from this syllabus were recoverable.

9. Write a 3- to 4-page reflection in which you address each of the tasks below:

• Define and describe the digital forensics practices that you used to complete this exercise.

• Describe your methods of handling the digital forensics evidence that you used in this exercise.

• Explain why you chose the two data-recovery programs you selected.

• Illustrate how you used the digital forensics tools you downloaded to locate, recover, and identify the three digital files.

• Critique your success (or failure) when attempting to recover the three digital files.

• Provide solutions for data recovery techniques and suggest tools to use.

• Explain how you can apply this skill in the future.

Note: Your final product should be a 3- to 4-page Microsoft Word document, using four to six scholarly sources beyond your course textbook. Write in a clear, concise, and organized manner; demonstrate ethical scholarship in the accurate representation and attribution of sources (APA); and display accurate spelling, grammar, and punctuation.

Information related to above question is enclosed below:

Attachment:- Files Link.rar

Reference no: EM132186833

Questions Cloud

Create a flyer for patrons using given information : You're working for a local coffee shop that offers free wireless access to customers. Your supervisor has asked you to create a flyer for patrons.
Create and maintain a positive home-school partnership : How, from the perspective of your professional role, you communicate with families on a weekly basis.
Compute the dividend refund : Compute the dividend refund for 2018 and the amount of any RDTOH to be carried forward - Compute the federal Part I tax and provincial tax
How you would connect with the families at this school : Define the relationship between the struggles of parents and the struggles of their children. Defend your response.
Describe the digital forensics practices : Define and describe the digital forensics practices that you used to complete this exercise. Describe your methods of handling the digital forensics evidence.
Discuss how the flipped classroom idea can be used : Discuss if a school or teacher should use a multimedia resource that is absolutely amazing in delivering both content and assessment, but is not accessible.
Writes the limericks out to a file : How do you make a python function which accepts one string parameter of two limericks in one variable, writes the limericks out to a file and returns the count
Examine misconceptions about culture : Apply cultural relativism in order to examine misconceptions about culture that may occur due to ethnocentrism.
Data about one person or item makes : 1-All of the data about one person or item makes up a:

Reviews

Write a Review

Computer Engineering Questions & Answers

  A program that takes an input two files names

Write a function fcopy() that takes an input two files names as a string and copies the content of the first file into the second .

  Create a chatbot with basic lambda functions

Summary of the approach or methodology and innovation - Summary of the expected outcomes and significance - overview of the existing research related

  Possible media solutions that will support this download

You are sitting at your desk at work, using your laptop computer. The boss calls an emergency meeting for you and several coworkers, and asks everyone to bring his or her laptop computer.

  How technology impacts the given ethics topic

Hhow this computer ethic is developed or derived? How technology impacts this ethics topic and how the topic impacts technology?

  Develop guidelines for professional responsibilities

Continuing with the scenario from Week 5, develop guidelines for professional responsibilities in an organization related to identifying and resolving ethical issues in IT.

  Wave maker-editor software

Describe what wave maker-editor software can do and what are the sensor and wave can be use. With all details.

  Revealing and exploring system topology

Code and a 1000 word report on revealing and exploring system topology - what it reveals about the system topology and why this is a useful thing to know

  What goes into a disaster recovery plan

Create a five-seven- PowerPoint Presentation on what goes into a disaster recovery plan. Include all the units as outlined in the textbook.

  What reviews would be planned and the schedule

design a Quality Assurance Plan for the project (Keep the QA Plan at about 11 pages or less).What reviews would be planned and the schedule.

  How data mining can threaten privacy

Explain what "shield" you think is appropriate for the last computer program you developer for a specific user.

  State advantages and disadvantages of waterfall approach

Based on your reading and research, select at least three of the SDLC Phases. In Microsoft Word, write a 3-5 page paper about them.

  Write a program that asks for the number of units sold

Write a program that asks for the number of units sold and computes the total cost of the purchase. Write a program that asks for the number of checks written durign the past month, then computes an displays the bank's fees for the month.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd