Martinakom

Not Rated (0)

$12/per page/Negotiable

About Martinakom

Levels Tought:
Elementary,Middle School,High School,College,University,PHD

Expertise:
Accounting,Applied Sciences See all
Accounting,Applied Sciences,Architecture and Design,Biology,Business & Finance,Calculus,Chemistry,Computer Science,Geology Hide all
Teaching Since: Jul 2017
Last Sign in: 307 Weeks Ago, 6 Days Ago
Questions Answered: 5023
Tutorials Posted: 5024
Category > Business & Finance Posted 16 Aug 2017 My Price 5.00

You're told by the systems administrators that the "typical" desktop computer at the company has a 1 Terabyte hard drive

You're told by the systems administrators that the "typical" desktop computer at the company has a 1 Terabyte hard drive, a CD/DVD burner drive, USB ports, etc.; and that by policy, external devices, thumb drives, etc., are all enabled. Late Friday night, after everyone went home, you found that Tom had powered his desktop computer off at the end of the day; you were able to boot Tom's computer with a postmortem analysis tool kit, and image copy his hard drive to an external drive you brought with.

  1. Outline the steps you'd take to examine that drive image for hidden data. Where would you look, for what sorts of suspect information?
  2. Suppose you find a lot of files that have file types you do not recognize immediately. Outline the steps you might take to help determine whether these files have information pertinent to your investigation. Are there software tools you could use to help you deal with thousands of such files, without your having to look at every single one? See if you can find any.
  3. What sort of ongoing surveillance activities would you suggest to management? What are the risks that such surveillance techniques might compromise your investigation? How can you control those risks?

Answers

Not Rated (0)
Status NEW Posted 16 Aug 2017 03:08 PM My Price 5.00

Hel-----------lo -----------Sir-----------/Ma-----------dam----------- Â-----------  -----------Tha-----------nk -----------you----------- fo-----------r y-----------our----------- in-----------ter-----------est----------- an-----------d b-----------uyi-----------ng -----------my -----------pos-----------ted----------- so-----------lut-----------ion-----------. P-----------lea-----------se -----------pin-----------g m-----------e o-----------n c-----------hat----------- I -----------am -----------onl-----------ine----------- or----------- in-----------box----------- me----------- a -----------mes-----------sag-----------e I----------- wi-----------ll -----------be -----------qui-----------ckl-----------y

Not Rated(0)