Preview

Digital Forensics Paper

Good Essays
Open Document
Open Document
1687 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Digital Forensics Paper
Define and describe the digital forensics practices that you used to complete this exercise Computer forensics is the process of gathering, evaluating and retrieving data, mainly to stop or prevent fraud, to gather and preserve data information for a criminal investigation, or it can be used to recover data that has been deleted or accidentally lost. Most forensic investigators should be required to have knowledge of a computer, the operating system, and hardware and software. Data recovery can be done on CD, DVD, USB, PDA, hard drives, and mobile phones, and many other devices. (Hopkins, n.d.) The first thing we need to do was to gather the names of the files that were lost or deleted. After knowing the files that we were looking for, …show more content…
It is a process, whereas you restore your data, that has been accidentally deleted, lost, corrupted or is somehow inaccessible to you for any reasons. (Rouse, 2012) There are many ways in which you can recover lost data from your computers or network. One process I like to use it computer recovery or restore to a certain point or day, it keeps most of your files in tack, but it can restore all files that were deleted or corrupted by a virus or a malware attack. There is also a system backup, whereas the administrator can do a complete system restore, and bring the system back to a certain date and time in order to recover the file that you needed, and bring the system back on line and up to date. Most of the time your data should be stored off site somewhere, this way if you have a problem at the main location, such as a power outage or some type of natural disaster and you do not have access to your file, you can still restore them from the off-site location with ease. This all should be listed in your Disaster Recovery Plan, and should be updated on a regular basis as well as your security team.
Explain how you can apply this skill in the

You May Also Find These Documents Helpful

  • Powerful Essays

    272. Newman, R. (2007). Computer Forensics: Evidence Collection and Managment. Boca Raton FL: Taylor & Francis Group. LLC.…

    • 4846 Words
    • 17 Pages
    Powerful Essays
  • Good Essays

    Nt1310 Unit 3 Assignment 1

    • 1244 Words
    • 5 Pages

    Analysis and explanation of the threat and vulnerability pairs and their likelihood of occurrence. The chart explains the aspects of the vulnerabilities and threats. b\Because we have no data on these threats on the amount of occurrences we cannot assign an impact rating or a probability rating in which is high medium an low (reference page 121 of book)…

    • 1244 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    IS3110 Week5 Lab

    • 503 Words
    • 2 Pages

    3 Review the “Restore Horror Stories” scenario on page 371 of the text. What is most important when considering data back-up? Whats most important when considering a data-backup up is to test the backups to make sure they are going to work when the system needs to be restored. There is no use in backing up a system and never look to see if they are being done properly. If you backup corrupt files, you are then going to restore those corrupt files back into the system. Also having a good backup plan in place would avoid such errors such as the reading states.…

    • 503 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Unit 8 Assignment 1

    • 509 Words
    • 3 Pages

    For safety backups should be stored off site because you could lose everything this will allow you to have the information off-site to be retrieved at a later date.…

    • 509 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    As a support technician for a small company, your job is to support the PCs and their users, the employees. Ben, a coworker, comes to you with a problem. For some reason, Windows XP is not booting correctly on his computer. Ben is worried, because he has many important data files in several locations on the hard drive. He does not know which files are located in which folders. Ben is also worried about losing his saved e-mail addresses, individual e-mails, and his favorite links on Microsoft Internet Explorer®. You try everything you know to recover Ben’s computer, but nothing works. Ben’s system is corrupted beyond repair.…

    • 1382 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Unit 7 Assignment 2

    • 208 Words
    • 1 Page

    An important part of this phase is creating a password policy that would enforce complex passwords. This helps protect your network from unauthorized access. Adding a physical security measure will also help with the security of your network. Locking the physical door to the data center will help protect someone from physically accessing the network. Another important step would be to perform daily backups of the servers. In the event of a system failure or disaster, you can restore most of the data to its most recent state.…

    • 208 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Forensics2E Lab02 AW

    • 256 Words
    • 2 Pages

    key evidence files. You then validated the hash code using EnCase Imager and P2 Commander,…

    • 256 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Cis 417 Assignment 1

    • 755 Words
    • 4 Pages

    There are many challenges for a computer forensics specialist and everyone faces the same challenges. There first challenge is to find a way to examine an increasing number of digital devices, each containing an immense volume of data, in a timely manner with limited resources (Charles L Cohen, n.d.). Another challenge is the fact that offenders are finding easier ways to store data. They…

    • 755 Words
    • 4 Pages
    Good Essays
  • Good Essays

    The BTK Killer

    • 654 Words
    • 3 Pages

    In the case of the BTK killer the metadata that the forensic examiner was able to uncover was the fact that the user account of the computer being used was named “Dennis” and it gave specific details about the location of the computer. The computers that were used were identified as one at public library and a computer at the church. All of this information was located in the “properties” section of the document. The details the metadata provided about the church then prompted the investigators to conduct an internet search on church and found that there was a Dennis Raider on staff. Additionally the metadata was able to provide the date the file was created, the date that the file was modified, and the date that the file was printed. Metadata is used in all forms of digital media to include documents, web pages, videos, images and much more. The metadata in this case was created automatically by the Microsoft Office application and was saved even though Dennis Raider deleted the file from the disk.…

    • 654 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Case Project 5-3 & 5-5

    • 865 Words
    • 4 Pages

    Under the silver platter doctrine, evidence obtained by state agents in an unreasonable search and seizure was admissible in a federal criminal trial, where no federal agent participated in a search and seizure and the state officers did not act solely on behalf of the United States (Hills, 1999). Simply put, federal officers cannot allow state police to do the dirty work, and then claim that they did not violate search and seizure rights. By analogy, no government agent can stand by, allow a private citizen to violate search and seizure strictures on the government 's behalf, and then claim innocence as to the violation (Hills, 1999).…

    • 865 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Lab 1

    • 414 Words
    • 2 Pages

    2. Which items within WinAudit’s initial report would you consider to be of critical importance in a computer forensic investigation?…

    • 414 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Web 240 week 2 dqs

    • 340 Words
    • 1 Page

    I went to www.bates.edu and read the article on file management best practices. I learned that the two best practices are first to keep a backup of files, this is one of the most common ways to manage files this works by placing the files of every file that is created into two different places this helps incase on of the files are lost or damaged. The second way is to name the files in a logical, and reasonable way, doing this will help to make sure you can keep up with what file is what, and the files will be better organized. Applying this to my personal and professional life can help me to never lose another file again and can also help me to better organize my files.…

    • 340 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    Input Controls

    • 1029 Words
    • 5 Pages

    Reconstructing Events: an event can be reconstructed after a problem has occurred. The amount of damage that occurred with an incident can be assessed by reviewing audit trails of system activity to pinpoint how, when, and why the incident occurred (Goplakrishm, 2013).…

    • 1029 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Kroll Ontrack, which specializes in data recovery, has retrieved evidence from hard drives damaged by floods, fires, and even a melted disk drive from the space shuttle Columbia, which was destroyed in 2003. Whether or not a hard drive can be salvaged depends on the extent of damage to what are called "platters," the small discs where the data is…

    • 596 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Week Discussion

    • 754 Words
    • 4 Pages

    It is important to backup your files regularly. A best practice is to select a time and day each week to complete this task, then write it on your weekly calendar.…

    • 754 Words
    • 4 Pages
    Good Essays