StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Easy Retrieval of Data from Hard Disk Drives - Term Paper Example

Cite this document
Summary
The paper " Easy Retrieval of Data from Hard Disk Drives" presents a software development project for computer forensics. The latter deals with the objectives and what the Project intends to deliver, the boundaries of the project, the necessary hardware components requirements for the user, etc…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.9% of users find it useful
Easy Retrieval of Data from Hard Disk Drives
Read Text Preview

Extract of sample "Easy Retrieval of Data from Hard Disk Drives"

Software Development Project – Easy Retrieval of Data from Hard Disk Drives Table of Content I. Introduction II. The proposed project of computer forensics III. The objectives and what the project intends to deliver IV. Target customer base V. Business or technical needs that will be met by the project VI. The boundaries of the project- what the project will not address VII. Detailed implementation of the project VIII. The coding standards IX. Version control policy X. List of the necessary hardware components requirements for the user XI. An estimate of timeline completion of the project XII. Significant risks that may impact the project XIII. Conclusion and justification of the project XIV. References I. Introduction Computer forensics deals with the identification of any legal evidence using the computers, as well as other forms of digital storage devices. After collecting, the evidences are put through a thorough forensics examination to obtain and recover the information the investigators need. The computer forensic investigation chiefly involves the investigation of the computer crimes, the cyber crimes, and also during a court hearing. Subsequently, there is utilization of the later function of computer forensic investigation by the courts of the United States and also of the European Union as evidence of digital crime cases (Volonino & Anzaldua, 2009). II. The Proposed Project of Computer Forensics The proposed project is based on a software program that can easily retrieve any specific data from the hard disk drive of any computer. This is because the hard disk acts as a form of storage device for the computer. Thus, there is storage of most data and also files in this hardware device. Moreover, for any forensic investigator to obtain any sort of digital evidence, they must first look for the details from the computer hard disk. Therefore, the hard disk is one of the chief vital components of the computer because it contains most of the computers’ files, data and also important documents. Consequently, there is a great significant in the development of a software program for easy and quick retrieval of data contained in the hard disk. Moreover this project of computer forensic works in conjunction with the software of data recovery program. The data recovery program works by recovering any form of lost data by the computer (Volonino & Anzaldua, 2009). III. The Objectives and what the Project Intends to Deliver The main reason for the development of this computer forensic project is to assist in the quick and effective investigation procedures required during a forensic investigation. For instance, the main part of the computer forensic is chiefly the utilization of the computer hard disk to access any information. This is because hard disks are capable of storing large amount of information about anything. Therefore, because the computer hard disk is capable of storing millions of data on anything, it becomes very tedious for the forensic investigator to search for the exact data that is needed for the investigation (Volonino & Anzaldua, 2009). Moreover, this action needs a lot of time and thus consumes time. Therefore, for the investigator to be competent and to easily access all the details from the hard disk, the forensic investigator needs to implement this computer forensic project. Thus, the chief reason for the development of this computer forensic project is to assist the investigators in easing the procedures of the investigation. Therefore, the computer project is about how the forensic investigator is capable of obtaining and easily retrieves data from any hard disk of a computer system to be utilized in the investigation procedures. The investigator will find this project extremely helpful to him and also to the court when handling any form of forensic cases. Thus the project focuses majorly o the improvement of the hard disk devices. Additionally, this project will focus on the fundamental process of retrieving information from a given hard disk device. Thus it will utilize programs like the ASCII coding systems and other forensic tools (Huebner, 2010). IV. Target Customer Base The main objective of this project of computer forensics is targeting mainly the clients. It majorly aims at assisting the parties involved in any form of forensic investigation. For instance, it focuses on the forensic investigators, the clients, and also the court and the authorities’ involved during the process of forensic investigations. This project chiefly targets the forensic investigators because they tend to use the computers to access any form of digital information. Thus, the investigators will find this program helpful in their field during the forensic investigation process. For instance, the forensic investigators are capable of retrieving digital information which they can use during hearing of the court cases (Huebner, 2010). V. Business or Technical needs that will be met by the Project The computer forensic project is further designed to meet all the needs that will enable efficient procedures during the forensic investigation. This project will subsequently make the process of forensic investigation to be extraordinarily easier and also faster. Thus the investigator will be able to take lesser time in the procedures involved in collecting of forensic evidences, presenting of the details and furthermore in writing of the final reports. Additionally, the software will enable the investigator to access all the data in the computer. Additionally, the project will enable the forensic investigators to obtain the required evidences without much difficulty. More over the investigators have an assurance that the evidence obtained are not to be compromised or even altered at any time, thus the evidences are competent and ready for use during court proceedings (Huebner, 2010). VI. The Boundaries of the Project- what the Project will not Address Although the computer forensic project is aimed at delivering an effective means of solving al the problems faced during the forensic investigation, there are some of the drawbacks that the project will not be capable of achieving. These setbacks include the accessing of information only contained in the hard disk alone and not in the other storage devices of a computer (Huebner, 2010). VII. Detailed Implementation of the Project There are numerous procedures in which this technique can be effectively implemented. For instance, one of the techniques that can be implemented is the utilization of a coding standard. The project will further entail application of various techniques that will be capable of recognizing both the structured and the unstructured data in the hard disk. This project works through the identification and also the removal of systems and files that are available in the computer in duplicate forms. Secondly, the user is given a chance to try and insert or even remove any part of the hard disk. Subsequently, the investigator tries to identify any region of the hard disk that might be containing any form of textual data for instance the ASCII. Later on, the investigator who is also the user of the software is to index the hard disk by utilizing the appropriate tool. Eventually, the user presents a familiar and a friendlier and also a more powerful interface to search the hard disk (Solomon, Rudolph, Tittel, Broom, & Barrett, 2011). VIII. The Coding Standards This coding standard includes the use of a unique naming system of conventions, the style of the coding system. The project utilizes the coding system of ASCII. This coding system is significant to this project because it works by converting the analog into the digital form and furthermore it converts the digital to the analog forms (Mohay, 2003). IX. Version Control Policy The project uses a version control policy that ensures that there is easy conversion of information from one form to the other. This act enables the project to work effectively through the implementation of a given set of software program (Mohay, 2003). X. List of the Necessary Hardware Components Requirements for the User While carrying out this computer forensic procedure, there are necessary hardware components that ought to be utilized by the user to attain the required outcome. Some of the hardware is the hard disk, the control unit, also the keyboard, the mouse, and also the monitor, the power supply system (Maras, 2012). Moreover, the scheme enables the utilization of a variety of tools for the data analysis. The software comprises of an ample digital forensic tools specifically created for use by the hard drive. These tools are utilized majorly to examine the hard disk drives of the computer. Some of these tools include the chat examiner, also the e-mail examiner, the network examiner, and also the text searcher, the registry analyzer, and also the forensic sorter. For instance, the forensic sorter is utilized in the sorting of the entire sections of a give hard disk of the computer. This action happens when the tool sorts all the files contained in the selected hard disk drive. Thus some of the files that the tool is competent in sorting are the documents, the images in the hard drive, as well as the archive. Moreover there is the tool of forensic replicator. This tool works by completing all the bit acquisition in the hard drive systems. Additionally, there is the passware kit for the forensic purposes. This one works through the breakage of passwords for the encrypted files in the hard drive of a computer. Subsequently, there is the explorer free tool that works by mounting any form of forensic images as an example of a virtual drive in computers. Finally, there is the lockdown tool that works by locking almost all the available hardware devices of the computer so as to offer adequate protection of all the evidences contained in the computer hard drive systems (Maras, 2012). XI. An Estimate of Timeline Completion of the Project The chief program that is the graphics programming is capable of searching the type of information that the investigator needs. The program accomplishes this task through searching of the required data according to the set timeline. Subsequently, the information tends to appear on the visualization section thus allowing the investigator to view the information he is looking for. The creation of a set of timeline is extremely essential in that it enables the investigator to find the essential details from the computer with ease. For instance, the data can be presented in a timeline through the utilization of pixels that will represent the events. Moreover, there is the timeline that is set to correspond with the time like hours or even minutes. Thus, the investigator is capable of visualizing the timeline in an easy manner (Maras, 2012). XII. Significant Risks that may Impact the Project Although this project has a significant importance to the user, it also displays some of the negative impacts and risks. For instance, there is the risk of the project being cracked down by the unauthorized individuals. The crackers might be capable of accessing private information of individuals stored in the hard disk (Maras, 2012). XIII. Conclusion and Justification of the Project In conclusion, this computer forensic project is of great importance in the field of forensic science. This is because the software enables the investigator to conduct the investigation process efficiently. This project further enables the forensic investigator to collect the required forensic evidences and analyze them comprehensively without compromising the integrity of the evidences. XIV. References Huebner, E. (2010). Open source software for digital forensics. New York, NY: Springer Publication Maras, M. (2012). Computer forensics: cybercriminals, laws, and evidence. Canada: James and Bartlett Publishers. Mohay, G. (2003). Computer and intrusion forensics. Massachusetts, MA: Artech House Publication. Solomon, M., Rudolph, K., Tittel, E., Broom, N., & Barrett, D. (2011). Computer forensics jumpstart. Indiana, IN: John Wiley and Sons Publication. Volonino, L., & Anzaldua, R. (2009). Computer forensics for dummies. Indian, IN: John Wiley and Sons Publication. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Easy Retrieval of Data from Hard Disk Drives Term Paper Example | Topics and Well Written Essays - 1750 words - 1, n.d.)
Easy Retrieval of Data from Hard Disk Drives Term Paper Example | Topics and Well Written Essays - 1750 words - 1. https://studentshare.org/information-technology/1760353-software-development-practice
(Easy Retrieval of Data from Hard Disk Drives Term Paper Example | Topics and Well Written Essays - 1750 Words - 1)
Easy Retrieval of Data from Hard Disk Drives Term Paper Example | Topics and Well Written Essays - 1750 Words - 1. https://studentshare.org/information-technology/1760353-software-development-practice.
“Easy Retrieval of Data from Hard Disk Drives Term Paper Example | Topics and Well Written Essays - 1750 Words - 1”. https://studentshare.org/information-technology/1760353-software-development-practice.
  • Cited: 0 times

CHECK THESE SAMPLES OF Easy Retrieval of Data from Hard Disk Drives

Installing Server and Managing the Active Directory

Another useful technology is the Volume Shadow Copy Service (VSS), which lets Windows keep point-in-time snapshots of data volumes so users can recover accidental deleted files or revert to earlier versions of documents they are working on.... RAID 0 (disk mirroring) is an excellent method for providing fault tolerance for boot/system volumes, while RAID 5 (disk striping with parity) increases both the speed and reliability of high-transaction data volumes such as those hosting databases....
3 Pages (750 words) Essay

Laptop Versus Desktop

1 GB hard disk space was more than enough a decade ago.... Laptops use physically smaller drives, which can only offer so much storage space.... Though larger drives are available, 100GB is still common on a laptop, while 500GB desktop drives are seen all the time (again, bigger drives can be had).... ??Storage - One of the major places where laptops and desktops differ is in how much hard drive space they offer....
2 Pages (500 words) Essay

Difference between Data Redundancy and Backup

second hard disk mounted internally offers ideal backup for data that is frequently needed in case of loss of data from the resident hard disk.... It is most suitable for backing up music, photos, and other data from the computer's memory.... t has a relatively high capacity to provide adequate backup for music and video files, pictures and other unused data from the computer memory.... It can only backup a small amount of data and information (Microsoft Inc....
9 Pages (2250 words) Essay

Reinventing Data Protection

The following paper under the title 'Reinventing Data Protection' presents the computer data which is stored several ways such as in my hard disk drive, universal serial bus memory sticks, smartphone memories, social media accounts, electronic mail addresses.... I also keep duplicate files in separate storage just in case data is corrupted or infected with a virus.... If the data were compromised, I will try to retrieve my duplicate files stored somewhere else and avoid the same mistakes....
1 Pages (250 words) Essay

Addressing Security Vulnerabilities in Windows Server

I believe that the gravity of these problems should be understood such as the easy retrieval of the directories and documents in a networked system.... These upgrades will change the face of the company as user interface will become more user friendly for employees while more hard and tough for the attackers who want to breach and use the delicate information that our servers and operating systems hold (Kanjilal, 2010).... Retrieved 11 September 2014, from http://www....
2 Pages (500 words) Case Study

Quality Insurance of the Forensic Software Testing Support Tools

The paper " Quality Insurance of the Forensic Software Testing Support Tools" proposes a test plan for the project on the development of a hard disk drive" a summary of the quality insurance objectives as well as the quality metrics,  the areas of the application that will be undergoing testing.... he quality objective for the application of the quality metrics on the hard disk drive is extremely important.... Another objective of this test is to accurately define the chief sources of the data as well as information that was in use during the preparation....
11 Pages (2750 words) Term Paper

Components Needed for the Desired PC to Build

The paper "Components Needed for the Desired PC to Build" outlines that building the computer, the compatibility and suitability of parts  - computer case, motherboard, RAM, power supply, hard drive, screens, video cards, keyboard and mouse, CD+DVD drive, camera, and Speakers -were kept in mind.... All the equipment demanded are obtained from reliable and trusted suppliers, who have made good repute in the market with their best quality supplies.... For the functions of DVD and Blu-ray disc play, Television record, upload scan edit and print photograph and videos, and data transfer from camera to Dell Optiplex 270 is offered by the Dell Optiplex 270....
5 Pages (1250 words) Case Study

Basics of a Computer System

Apart from hard disk, external storage devices such as floppy, CD/DVD, ZIP, Pen drive memory stick etc are most commonly used.... The CPU has a hard disk which stores all the information.... “USB Flash Drives have become an indispensable part of the day-to-day workflow, whether in class or at home, at the office or on the move, it has made transferring large amounts of data a simple and efficient process.... Documents, presentations and any other form of data can be stored on a USB Flash Drives, and has proved a far more effective way of transferring data than burning CDs, and superseded old floppy disks” (USB Flash Drives)...
1 Pages (250 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us