Report of data acquisition and data recovery

Assignment Help Basic Computer Science
Reference no: EM133214109

Case Study: You have been assigned a child abduction case. A 16GB USB is found from the suspect's apartment, and it is expected to have very important information related to the case. The USB contains several Doc files, a couple of image files, and some text files.

Data Preparation: You need to use your own USB to create/delete files as mentioned in the scenario below and perform the digital forensics investigation:

1. You need to create six files of type pdf, excel and word documents, where you need to name these files as follow: BN309_Assig1.*, where * depends of the file type. In addition, you need to change the attribute of these files to describe the Metadata which holds data such as your name as an author, organization name "MIT", computer name "based on your terminal name", date/time created, and comments such as "created for Assignment1 of BN309".

2. Modify the extension of one of the doc file to .jpeg

3. Then you need to delete 3 files including the file you have modified its extension, one of each type. Provide the list of references using IEEE referencing style at the end of the report

You need to make a report of data Acquisition and data recovery regarding the case above by using PRODISCOVER tool. Please follow the requirement below:

Prepare a forensic image (bit stream copy) with the record of data deletion. Explain the method and tool you have used in acquiring data, and data recovery, screenshoots during the process are require. Please submit this image with your assignment. You need to cover the challenges to make a successful acquisition, and what are the relevant formats to use and why. Describe the steps required for search and seizure.

Reference no: EM133214109

Questions Cloud

Competing firewalls on the market : You are asked for a report to help your company choose a firewall that fits their requirements. The company currently has a Web server, email server, content se
Discuss strategies for virtualization in cloud development : Help to build an essay and discuss strategies for virtualization in cloud development. Key ideas to address are containers, sandboxing, and accessing. How do th
What are the traits of good information : What are the traits of good information? Explain one of them in detail in the context of industry use.
Cobit framework : You go on to tell the intern that the COBIT framework was the followed when creating various processes at the company you work for.
Report of data acquisition and data recovery : Case Study: You have been assigned a child abduction case. A 16GB USB is found from the suspect's apartment, and it is expected to have very important informati
Prepare a forensic image with the record of data deletion : Case Study: You have been assigned a child abduction case. A 16GB USB is found from the suspect's apartment, and it is expected to have very important informati
Defines several target types on which nessus agents : Per the Best Practices Guide, which of the following statements are true? Select the correct answer(s).
Cloud computing goes hand-in-hand with virtualization : Cloud Computing goes hand-in-hand with virtualization. Do some research on this topic and describe a scenario of a cloud company's infrastructure that is virtua
Identifies the wireless network : Service Set Identifier (SSID), also known as the wireless network name, identifies the wireless network. An SSID is configured on the wireless AP (on the access

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Enforcing security policies

Why, or in what ways, would a governance committee be more effective than an executive in enforcing security policies?

  Cyber-attack can cause economic damage

There are a variety of ways that a cyber-attack can cause economic damage.

  Business continuity plan

Create a business continuity plan for your organization. how will your organization continue its business both during and after a cyber-attack?

  Define security attacks-mechanisms and services

Define security attacks, mechanisms, and services, and the relationships between these categories. Define where that information is stored.

  Course-operations security

Conducting a Risk and Control Self-Assessment(RCSA) will identify 4 key challenges and risks that face organization what are these and what are their importance

  Which structure would be the best for the storyboard

Case 2-3 Michael wants to create a Website based on his famous cooking show. He would like to provide instructions on how to create some of his favorite dishes. He would like his recipes to be displayed in very simple, step by step pages.

  Discuss how wages are determined in labor markets

Discuss how wages are determined in labor markets. Explain how a monopsony market structure is affected by a price floor

  Contrast two difference cloud computing services

Explain the differences and the similarities and select your choice of providers if you had to make the decision for your business.

  Probability of the game ending

Can you provide lower and upper cut-offs times such that the probability of the game ending between these times is 95%?

  Change industry economic structure

What are transaction costs and why are they important? Provide one example of how electronic commerce could help change an industry's economic structure

  Discuss a current business process in a specific industry

Discuss a current business process in a specific industry. Note the following:-The current business process itself.-The industry the business process is utilize

  Empowering leadership and effective collaboration

How do geographically dispersed teams collaborate effectively?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd