How does your technique hinder forensic analysis

Assignment Help Computer Engineering
Reference no: EM131669104

Research Assignment

This is your second, and final research assignment in this course.

Counter forensic activity is becoming increasingly common as the knowledge that digital devices record numerous artifacts to assist investigations is also becoming increasingly common. Often, when the topic of counter forensics comes up in a conversation everyone likes to discuss sophisticated and complex counter forensic techniques such as steganography. However, there are a number of techniques out there that are not only less sophisticated, but can also be interpreted as typical system processes. For example, I just finished a case where windows Disc Defragmenter was used in an attempt to make deleted data unrecoverable.

For this research assignment, do some brief research into counter forensic activity and techniques, choose two techniques that stand out to you as interesting, and writer your paper. Your paper should at a minimum discuss the following for each:

1. What is your technique?
2. How is your technique implemented?
3. How does your technique hinder forensic analysis?
4. Is there a way for examiners to detect or reverse your technique?

As per the syllabus, your research paper should include 12-15 pages of content including an introduction and conclusion. Your work should demonstrate a full understanding of the above topics and should fully explain the concepts associated with each, the purpose for each, how each is applied to the investigations we may someday conduct, and the impact it may have on an investigation should these fundamentals be omitted from the investigative process.

Your paper should be formatted in APA format. If you are not familiar with APA format, I highly recommend Purdue Owl as a resource. For this assignment, I do not restrict the resources which you are able to use, however if you submit a research paper that only has web articles listed as resources it may have a significant impact on your grade!

Please feel free to address any questions in the "Ask the Professor" forum, so that I may address them with the class.

Reference no: EM131669104

Questions Cloud

Create a list of possible deductions for your household : Create a list of possible deductions for your household. Are you able to reduce your taxable income enough to place you in the next lowest tax bracket?
Results of a horse race with three horses : You are tracking the results of a horse race with three horses. 1. PSEUDOCODE: Write the pseudocode that:
Advantages and disadvantages of using a distributed : What are the advantages and disadvantages of using a distributed vs. centralized database design?
True of organizational? structure : Which of the following is true of organizational? structure?
How does your technique hinder forensic analysis : How is your technique implemented? How does your technique hinder forensic analysis? Is there a way for examiners to detect or reverse your technique?
Think again about the workers opportunities : Think again about the workers opportunities. Does their betterment also mean what’s best for your business?
Research security best practices and provide a presentation : It was recently reported that security breaches are on the rise within your small- to medium-sized business network.
Firm on equity markets is measured by which financial? ratio : The attractiveness of a firm on equity markets is measured by which financial? ratio?
Fed into the growth of the american musical theatre : Discuss the various musical idioms (jazz, ragtime, and vaudeville, so forth) that fed into the growth of the American musical theatre.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd