Assignment 2 CCJS 321
.docx
keyboard_arrow_up
School
University of Maryland, College Park *
*We aren’t endorsed by this school
Course
321
Subject
Computer Science
Date
Dec 6, 2023
Type
docx
Pages
8
Uploaded by BrigadierIceStarling13
1
Assignment 1
Jae Woo
CCJS 321 Section 6382
Professor Daniel Grove
01/28/2023
2
The importance of digital data recovery for evidence are in an abundance of ways to
complete this process to achieve goals. There are five specific ways to recover already deleted
digital files that I find necessary for the process of digital data recovery. The chain of custody
requires for each forensic image made up of the data recovered from the devices to be fully
recorded in detail. This includes full descriptions of the exhibit, cases references, custodian
details, and signatures of every party involved (Boddington, 2016). Recovering digital evidence
through the process of forensic imaging is another way to extract deleted data from a digital
device. There are two options when it comes down to forensic imaging, dead recovery, and a
live recovery. A dead recovery occurs when the data from a computer is being copied
forensically with the use of computer’s hardware that is booted from a trusted external device
as well as the use of copies of data from an extracted hard drive using a hardware write blocker
(Boddington, 2016). The process of a live recovery consists of extracting the live system data
before powering down a computer and involves capturing the data while at the same time,
preserving volatile memory as well. This process can only be occurred while the computer
operating system is still running throughout the entire process (Boddington, 2016). Volatile
memory recovery is considered an advantage of a live recovery process, and this allows the
ability to recover volatile and non-volatile data, such as the memory stored in RAM
(Boddington, 2016). Lastly, the recovery of deleted memory remnants is a phenomenon in
3
which includes a Windows operating system that dictates the length of the files saved on a hard
drive. The computer may pack a percentage of clusters in each file space and with whatever free
space is left will be filled with random data from the computer memory, which may be
recoverable and possibly even provide useful evidence (Boddington, 2016).
The Locard’s exchange principle means that within every criminal act, there will always
be something added or removed from the scene of the crime. There are many ways to ensure
that a mark won’t be missed during the digital evidence collection and acquisition, including
photographing the computer and the scene especially if the computer is already on, leaving the
computer off if it is already turned off, documenting all device model numbers and serial
numbers, and keeping all media away from magnets, radio transmitters and other elements that
could be potentially dangerous (Henry, 2009). There are many digital marks that are left behind
by users on the most common devices that includes a laptop, the internet, and even health and
fitness trackers. The most common device is the laptop. This one device could potentially store
a lot of digital marks that could be unknowingly left behind by the user. Laptops and the
internet are two devices that go hand-in-hand with the risks of leaving digital marks. They may
both contain fingerprints and other pieces of DNA on the device. Both passive and active digital
marks may occur during the use of these two devices. You need a laptop to use the internet and
the internet contains access to websites and social media sites that contains personal
information. Fitness trackers utilizes applications and subscriptions to put the user at risk from
potentially containing a lot of personal information (Kaspersky, 2022). Investigators can use
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Questions
Do some research and write a report that covers the following problems related to digital fingerprinting in order to accomplish this task:
You should pay attention to the following:
When and why is Digital Fingerprinting used?What is the fingerprinting algorithm's operation? How does it operate? Explanation of its basic workings.
arrow_forward
The question over interference, capture, modification, and fabrication is reiterated when it comes to data security, integrity, and availability. What are the connections between the first three terms and the last four? Is one or both of the three identical to all of the four? Is one or two of the four encompassing one of the three?
arrow_forward
Is it not vital to exercise care both while the data is being transported and after it has been delivered to its ultimate location? In addition, which of the following is the most reliable method for preserving the authenticity of data and identifying users?
arrow_forward
What is the most significant difference between top-down and bottom-up approaches to the protection of sensitive data?
arrow_forward
Is it not essential to exercise care not only during the process of transporting the data but also after it has been delivered to its ultimate location? In addition, which of the following is the most effective way to guarantee the accuracy of the data as well as the identity of the user?
arrow_forward
Many individuals believe that the General Data Protection Regulation (GDPR) is a "waste" of the time and money that companies spend trying to comply with it. This view is supported by the fact that the GDPR has received widespread criticism. Is that the case, or is the GDPR a piece of law that has the potential to be put into effect and that has some kind of significance?
arrow_forward
Does the word "privacy" have an agreed-upon meaning in common usage? Here are five things you can take to keep your personal data protected.
arrow_forward
To what extent do you agree with the following statements on the significance of data protection during transmission and storage: Which of these methods produces the greatest outcomes in terms of protecting sensitive information and verifying the identity of users?
arrow_forward
To what extent are you familiar with the concept of "data leaking"? Can you explain what took place? Who came to this conclusion? how can private data be safeguarded and monitored?
arrow_forward
Is it not vital to exercise care both while the data is being transported and after it has been delivered to its ultimate location? In addition, which of the following is more reliable with regard to the protection of data and the identity of users?
arrow_forward
What is the definition of the word data leakage?
arrow_forward
Distinguish between the sequential file and data- base approaches to data backup.
arrow_forward
Which procedures, in your opinion, are essential to ensure data security throughout both the transmission and storage processes? Which security technique also provides the best degree of protection for the users' veracity while yet preserving the integrity of the data?
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you
Fundamentals of Information Systems
Computer Science
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Related Questions
- Do some research and write a report that covers the following problems related to digital fingerprinting in order to accomplish this task: You should pay attention to the following: When and why is Digital Fingerprinting used?What is the fingerprinting algorithm's operation? How does it operate? Explanation of its basic workings.arrow_forwardThe question over interference, capture, modification, and fabrication is reiterated when it comes to data security, integrity, and availability. What are the connections between the first three terms and the last four? Is one or both of the three identical to all of the four? Is one or two of the four encompassing one of the three?arrow_forwardIs it not vital to exercise care both while the data is being transported and after it has been delivered to its ultimate location? In addition, which of the following is the most reliable method for preserving the authenticity of data and identifying users?arrow_forward
- What is the most significant difference between top-down and bottom-up approaches to the protection of sensitive data?arrow_forwardIs it not essential to exercise care not only during the process of transporting the data but also after it has been delivered to its ultimate location? In addition, which of the following is the most effective way to guarantee the accuracy of the data as well as the identity of the user?arrow_forwardMany individuals believe that the General Data Protection Regulation (GDPR) is a "waste" of the time and money that companies spend trying to comply with it. This view is supported by the fact that the GDPR has received widespread criticism. Is that the case, or is the GDPR a piece of law that has the potential to be put into effect and that has some kind of significance?arrow_forward
- Does the word "privacy" have an agreed-upon meaning in common usage? Here are five things you can take to keep your personal data protected.arrow_forwardTo what extent do you agree with the following statements on the significance of data protection during transmission and storage: Which of these methods produces the greatest outcomes in terms of protecting sensitive information and verifying the identity of users?arrow_forwardTo what extent are you familiar with the concept of "data leaking"? Can you explain what took place? Who came to this conclusion? how can private data be safeguarded and monitored?arrow_forward
- Is it not vital to exercise care both while the data is being transported and after it has been delivered to its ultimate location? In addition, which of the following is more reliable with regard to the protection of data and the identity of users?arrow_forwardWhat is the definition of the word data leakage?arrow_forwardDistinguish between the sequential file and data- base approaches to data backup.arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Fundamentals of Information SystemsComputer ScienceISBN:9781337097536Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning
Fundamentals of Information Systems
Computer Science
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning