How is your technique implemented how does your technique


Research Assignment

This is your second, and final research assignment in this course.

Counter forensic activity is becoming increasingly common as the knowledge that digital devices record numerous artifacts to assist investigations is also becoming increasingly common. Often, when the topic of counter forensics comes up in a conversation everyone likes to discuss sophisticated and complex counter forensic techniques such as steganography. However, there are a number of techniques out there that are not only less sophisticated, but can also be interpreted as typical system processes. For example, I just finished a case where windows Disc Defragmenter was used in an attempt to make deleted data unrecoverable.

For this research assignment, do some brief research into counter forensic activity and techniques, choose two techniques that stand out to you as interesting, and writer your paper. Your paper should at a minimum discuss the following for each:

1. What is your technique?
2. How is your technique implemented?
3. How does your technique hinder forensic analysis?
4. Is there a way for examiners to detect or reverse your technique?

As per the syllabus, your research paper should include 12-15 pages of content including an introduction and conclusion. Your work should demonstrate a full understanding of the above topics and should fully explain the concepts associated with each, the purpose for each, how each is applied to the investigations we may someday conduct, and the impact it may have on an investigation should these fundamentals be omitted from the investigative process.

Your paper should be formatted in APA format. If you are not familiar with APA format, I highly recommend Purdue Owl as a resource. For this assignment, I do not restrict the resources which you are able to use, however if you submit a research paper that only has web articles listed as resources it may have a significant impact on your grade!

Please feel free to address any questions in the "Ask the Professor" forum, so that I may address them with the class.

Solution Preview :

Prepared by a verified Expert
Computer Engineering: How is your technique implemented how does your technique
Reference No:- TGS02464634

Now Priced at $40 (50% Discount)

Recommended (92%)

Rated (4.4/5)