Report of data acquisition and data recovery

Assignment Help Basic Computer Science
Reference no: EM133214109

Case Study: You have been assigned a child abduction case. A 16GB USB is found from the suspect's apartment, and it is expected to have very important information related to the case. The USB contains several Doc files, a couple of image files, and some text files.

Data Preparation: You need to use your own USB to create/delete files as mentioned in the scenario below and perform the digital forensics investigation:

1. You need to create six files of type pdf, excel and word documents, where you need to name these files as follow: BN309_Assig1.*, where * depends of the file type. In addition, you need to change the attribute of these files to describe the Metadata which holds data such as your name as an author, organization name "MIT", computer name "based on your terminal name", date/time created, and comments such as "created for Assignment1 of BN309".

2. Modify the extension of one of the doc file to .jpeg

3. Then you need to delete 3 files including the file you have modified its extension, one of each type. Provide the list of references using IEEE referencing style at the end of the report

You need to make a report of data Acquisition and data recovery regarding the case above by using PRODISCOVER tool. Please follow the requirement below:

Prepare a forensic image (bit stream copy) with the record of data deletion. Explain the method and tool you have used in acquiring data, and data recovery, screenshoots during the process are require. Please submit this image with your assignment. You need to cover the challenges to make a successful acquisition, and what are the relevant formats to use and why. Describe the steps required for search and seizure.

Reference no: EM133214109

Questions Cloud

Competing firewalls on the market : You are asked for a report to help your company choose a firewall that fits their requirements. The company currently has a Web server, email server, content se
Discuss strategies for virtualization in cloud development : Help to build an essay and discuss strategies for virtualization in cloud development. Key ideas to address are containers, sandboxing, and accessing. How do th
What are the traits of good information : What are the traits of good information? Explain one of them in detail in the context of industry use.
Cobit framework : You go on to tell the intern that the COBIT framework was the followed when creating various processes at the company you work for.
Report of data acquisition and data recovery : Case Study: You have been assigned a child abduction case. A 16GB USB is found from the suspect's apartment, and it is expected to have very important informati
Prepare a forensic image with the record of data deletion : Case Study: You have been assigned a child abduction case. A 16GB USB is found from the suspect's apartment, and it is expected to have very important informati
Defines several target types on which nessus agents : Per the Best Practices Guide, which of the following statements are true? Select the correct answer(s).
Cloud computing goes hand-in-hand with virtualization : Cloud Computing goes hand-in-hand with virtualization. Do some research on this topic and describe a scenario of a cloud company's infrastructure that is virtua
Identifies the wireless network : Service Set Identifier (SSID), also known as the wireless network name, identifies the wireless network. An SSID is configured on the wireless AP (on the access

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd