Preview

Digital Forensics Paper

Good Essays
Open Document
Open Document
1687 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Digital Forensics Paper
Define and describe the digital forensics practices that you used to complete this exercise Computer forensics is the process of gathering, evaluating and retrieving data, mainly to stop or prevent fraud, to gather and preserve data information for a criminal investigation, or it can be used to recover data that has been deleted or accidentally lost. Most forensic investigators should be required to have knowledge of a computer, the operating system, and hardware and software. Data recovery can be done on CD, DVD, USB, PDA, hard drives, and mobile phones, and many other devices. (Hopkins, n.d.) The first thing we need to do was to gather the names of the files that were lost or deleted. After knowing the files that we were looking for, …show more content…
It is a process, whereas you restore your data, that has been accidentally deleted, lost, corrupted or is somehow inaccessible to you for any reasons. (Rouse, 2012) There are many ways in which you can recover lost data from your computers or network. One process I like to use it computer recovery or restore to a certain point or day, it keeps most of your files in tack, but it can restore all files that were deleted or corrupted by a virus or a malware attack. There is also a system backup, whereas the administrator can do a complete system restore, and bring the system back to a certain date and time in order to recover the file that you needed, and bring the system back on line and up to date. Most of the time your data should be stored off site somewhere, this way if you have a problem at the main location, such as a power outage or some type of natural disaster and you do not have access to your file, you can still restore them from the off-site location with ease. This all should be listed in your Disaster Recovery Plan, and should be updated on a regular basis as well as your security team.
Explain how you can apply this skill in the

You May Also Find These Documents Helpful

  • Good Essays

    Nt1310 Unit 3 Assignment 1

    • 1244 Words
    • 5 Pages

    Analysis and explanation of the threat and vulnerability pairs and their likelihood of occurrence. The chart explains the aspects of the vulnerabilities and threats. b\Because we have no data on these threats on the amount of occurrences we cannot assign an impact rating or a probability rating in which is high medium an low (reference page 121 of book)…

    • 1244 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Unit 8 Assignment 1

    • 509 Words
    • 3 Pages

    For safety backups should be stored off site because you could lose everything this will allow you to have the information off-site to be retrieved at a later date.…

    • 509 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    As a support technician for a small company, your job is to support the PCs and their users, the employees. Ben, a coworker, comes to you with a problem. For some reason, Windows XP is not booting correctly on his computer. Ben is worried, because he has many important data files in several locations on the hard drive. He does not know which files are located in which folders. Ben is also worried about losing his saved e-mail addresses, individual e-mails, and his favorite links on Microsoft Internet Explorer®. You try everything you know to recover Ben’s computer, but nothing works. Ben’s system is corrupted beyond repair.…

    • 1382 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Forensics2E Lab02 AW

    • 256 Words
    • 2 Pages

    drive. You prepared the contents of the seized hard drive using a variety of forensic tools as…

    • 256 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Cis 417 Assignment 1

    • 755 Words
    • 4 Pages

    There are many challenges for a computer forensics specialist and everyone faces the same challenges. There first challenge is to find a way to examine an increasing number of digital devices, each containing an immense volume of data, in a timely manner with limited resources (Charles L Cohen, n.d.). Another challenge is the fact that offenders are finding easier ways to store data. They…

    • 755 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Case Project 5-3 & 5-5

    • 865 Words
    • 4 Pages

    Under the silver platter doctrine, evidence obtained by state agents in an unreasonable search and seizure was admissible in a federal criminal trial, where no federal agent participated in a search and seizure and the state officers did not act solely on behalf of the United States (Hills, 1999). Simply put, federal officers cannot allow state police to do the dirty work, and then claim that they did not violate search and seizure rights. By analogy, no government agent can stand by, allow a private citizen to violate search and seizure strictures on the government 's behalf, and then claim innocence as to the violation (Hills, 1999).…

    • 865 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Lab 1

    • 414 Words
    • 2 Pages

    2. Which items within WinAudit’s initial report would you consider to be of critical importance in a computer forensic investigation?…

    • 414 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Web 240 week 2 dqs

    • 340 Words
    • 1 Page

    I went to www.bates.edu and read the article on file management best practices. I learned that the two best practices are first to keep a backup of files, this is one of the most common ways to manage files this works by placing the files of every file that is created into two different places this helps incase on of the files are lost or damaged. The second way is to name the files in a logical, and reasonable way, doing this will help to make sure you can keep up with what file is what, and the files will be better organized. Applying this to my personal and professional life can help me to never lose another file again and can also help me to better organize my files.…

    • 340 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    Input Controls

    • 1029 Words
    • 5 Pages

    Reconstructing Events: an event can be reconstructed after a problem has occurred. The amount of damage that occurred with an incident can be assessed by reviewing audit trails of system activity to pinpoint how, when, and why the incident occurred (Goplakrishm, 2013).…

    • 1029 Words
    • 5 Pages
    Better Essays
  • Better Essays

    CCJS321 Project 2

    • 1909 Words
    • 5 Pages

    Soloman, M. G., Rudolph, K., Tittel, E., Broom, N., & Barrett, D. (2011). Computer Forensics JumpStart, Second Edition. Retrieved from http://common.books24x7.com.ezproxy.umuc.edu/toc.aspx?bookid=41065…

    • 1909 Words
    • 5 Pages
    Better Essays
  • Good Essays

    The career of a computer Forensics Investigator is that of a specially trained professional who works with various law enforcement agencies as well as private firms to retrieve information from computers and other types of data storage devices. Computers and equipment can often be damaged externally as well as internally corrupted by hacking or viruses. The Computer Forensics Investigator is most well-known for working within the law enforcement industry. They can also be tasked to test the security of a private company 's information systems. The Investigator should have an excellent knowledge of all aspects of the computer including hard drives, networking, and encryption. The Computer Forensics Investigator recovers and examines data from computers and other electronic storage devices in order to use the data as evidence in criminal prosecutions. Following data retrieval, the Investigator writes up technical reports detailing how the computer evidence was discovered and all of the steps taken during the retrieval process. Patience and willingness to work long hours are qualities that are well suited for this profession.…

    • 966 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Kroll Ontrack, which specializes in data recovery, has retrieved evidence from hard drives damaged by floods, fires, and even a melted disk drive from the space shuttle Columbia, which was destroyed in 2003. Whether or not a hard drive can be salvaged depends on the extent of damage to what are called "platters," the small discs where the data is…

    • 596 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Week Discussion

    • 754 Words
    • 4 Pages

    It is important to backup your files regularly. A best practice is to select a time and day each week to complete this task, then write it on your weekly calendar.…

    • 754 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Lab 9

    • 616 Words
    • 3 Pages

    3. What is most important when considering data back-up? Registry, directories, and imperative operating data as well as licensing.…

    • 616 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    IS3110 Week5 Lab

    • 503 Words
    • 2 Pages

    3 Review the “Restore Horror Stories” scenario on page 371 of the text. What is most important when considering data back-up? Whats most important when considering a data-backup up is to test the backups to make sure they are going to work when the system needs to be restored. There is no use in backing up a system and never look to see if they are being done properly. If you backup corrupt files, you are then going to restore those corrupt files back into the system. Also having a good backup plan in place would avoid such errors such as the reading states.…

    • 503 Words
    • 2 Pages
    Satisfactory Essays