What will cause the data to be erased on a standard drive

Assignment Help Computer Engineering
Reference no: EM133238952

Case: You are assigned as a Digital Forensics Examiner with the Middle Georgia Cybercrime Task Force and you have been contacted by an Assistant United States Attorney (AUSA) to testify as an expert witness on aspect of data storage. The case in question deals with an individual who is believed to have been hiding data in what the AUSA refers to as "slack space," but based on his abstract use of jargon such as "volume slack," "RAM Slack," "File Slack," and "File System Slack" it is obvious he does not understand the terminology of Digital Forensics. In order to prepare for trial, you schedule a meeting with the AUSA in order to educate him on these topics.

Your assignment, is to research and define the following terminology:

1. File Slack

2. RAM Slack

3. Volume Slack

4. File System Slack

Then you need to answer the following case specific questions:

Question 1. The suspect in this case is using a Windows 10 Operating System, what types of slack space (the terminology listed above) could be used in this Operating System to conceal data?

Question 2. If you find data within the Windows 10 partition, which is not addressed by the Operating System, how could it have gotten there?

Question 3. Will the unaddressed data persist? If not, what will cause the data to be erased on a standard Hard Drive? What about on a Solid State Drive?

Reference no: EM133238952

Questions Cloud

What command would you use to save the contents : CIS221 California Institute of the Arts What command would you use to save the contents of the BCD store to a file? (Scroll up on the screen to see the whole
Create a truth table from a circuit : Explain step by step how to create a truth table from a circuit with 4 values A,b,c,d and y as the output?
How to installing hyper v and managing any number of vm : IT 278 Purdue Global University, how to installing Hyper v and managing any number of VMs, include any monitoring needed, as well as installation of updates
Design a python class to get the items : IE 7280 Northeastern University- Generate a standard normal distribution for three different sample sizes 100, 5000, 50,000. Design a python class to get the
What will cause the data to be erased on a standard drive : ITEC 4321 Middle Georgia State University, Will the unaddressed data persist? If not, what will cause the data to be erased on a standard Hard Drive
Is it fair not to let employers choose employees : Is it fair not to let employers choose employees with a track record of holding a job? What hiring policy best achieves fairness
Write an annotated bibliography on protective equipment : Protective Equipment Annotated Bibliography - Research an article and write an annotated bibliography on protective equipment
Difference between the histograms : CC 80316 Harvard University, Identify one difference between the histograms, in terms of the statistical properties. Can you comment on the average and/or
Discuss the barriers to effective communication : Discuss the barriers to effective communication. How could the problem have been prevented? In your answer, discuss the requirement for active listening

Reviews

Write a Review

Computer Engineering Questions & Answers

  What does the name ajax stand for

What does the name Ajax stand for? What is Ajax, and what does it do? Give an example of how Netflix® uses Ajax, and define why this makes the Web site faster.

  Define ?what could have been done to prevent this attack

?What could have been done to prevent this attack. Why weren't these steps taken initially

  Describe the methods of clustering

Define and Describe the following methods of clustering: Partitioning Method, Hierarchical Method, Density-based Method, Constraint-based Method.

  Write a description about cloud technology

Write a description about Cloud Technology and BUSINESS ANALYSIS - CRM & ERP. The information which you provide should be related to IT Industry.

  Write a paper about social engineering attacks

Write a paper about social engineering attacks and/or reverse social engineering attacks, and provide information about an attack that was successful.

  Go online and conduct a search on customer affinity choose

identify and provide the url a web site you visit frequently and identify 3 features of the site that cause you to

  Create a text file with one record of text data

Create a text file with one record of text data. This text file will be read by the program and the data in the text file will serve as a search term.

  What should have reported wrongdoing to senior management

What should have reported the wrongdoing to senior management? An IT assessment? An IT audit? Or both? Provide justification for your answer.

  What parameters characterize the nature of a particular sa

What parameters identify an SA and what parameters characterize the nature of a particular SA? What are the basic approaches to bundling SAs?

  Describe data flows in your company

Identify where you will use data collected from the Web and other sources of information such as sell statistics, user activity or social media data.

  Questiongiven assigned block of ip addresses 1949964018 a

questiongiven assigned block of ip addresses 194.99.64.018 a router 194.99.64.33 managing this block of ip addresses

  Generating class diagram and pseudocode

Develop a class named CustomerRecord which holds a customer number, name, and address. Incorporate different methods in order to set the values for each data field and output values for each data field.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd