StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Software Development Project Easy Retrieval of Data from Hard Disk Drives - Research Proposal Example

Cite this document
Summary
This paper 'Software Development Project – Easy Retrieval of Data from Hard Disk Drives' tells that the proposed project is based on a software program that can easily retrieve any specific data from the hard disk drive of any computer. This is because the hard disk acts as a form of storage device for the computer…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER95.1% of users find it useful
Software Development Project Easy Retrieval of Data from Hard Disk Drives
Read Text Preview

Extract of sample "Software Development Project Easy Retrieval of Data from Hard Disk Drives"

? Software Development Project – Easy Retrieval of Data from Hard Disk Drives Table of Content I. Introduction II. The proposed project of computer forensics III. The objectives and what the project intends to deliver IV. Target customer base V. Business or technical needs that will be met by the project VI. The boundaries of the project- what the project will not address VII. Detailed implementation of the project VIII. The coding standards IX. Version control policy X. List of the necessary hardware components requirements for the user XI. An estimate of timeline completion of the project XII. Significant risks that may impact the project XIII. Conclusion and justification of the project XIV. References I. Introduction Computer forensics deals with the identification of any legal evidence using the computers, as well as other forms of digital storage devices. After collecting, the evidences are put through a thorough forensics examination to obtain and recover the information the investigators need. The computer forensic investigation chiefly involves the investigation of the computer crimes, the cyber crimes, and also during a court hearing. Subsequently, there is utilization of the later function of computer forensic investigation by the courts of the United States and also of the European Union as evidence of digital crime cases (Volonino & Anzaldua, 2009). II. The Proposed Project of Computer Forensics The proposed project is based on a software program that can easily retrieve any specific data from the hard disk drive of any computer. This is because the hard disk acts as a form of storage device for the computer. Thus, there is storage of most data and also files in this hardware device. Moreover, for any forensic investigator to obtain any sort of digital evidence, they must first look for the details from the computer hard disk. Therefore, the hard disk is one of the chief vital components of the computer because it contains most of the computers’ files, data and also important documents. Consequently, there is a great significant in the development of a software program for easy and quick retrieval of data contained in the hard disk. Moreover this project of computer forensic works in conjunction with the software of data recovery program. The data recovery program works by recovering any form of lost data by the computer (Volonino & Anzaldua, 2009). III. The Objectives and what the Project Intends to Deliver The main reason for the development of this computer forensic project is to assist in the quick and effective investigation procedures required during a forensic investigation. For instance, the main part of the computer forensic is chiefly the utilization of the computer hard disk to access any information. This is because hard disks are capable of storing large amount of information about anything. Therefore, because the computer hard disk is capable of storing millions of data on anything, it becomes very tedious for the forensic investigator to search for the exact data that is needed for the investigation (Volonino & Anzaldua, 2009). Moreover, this action needs a lot of time and thus consumes time. Therefore, for the investigator to be competent and to easily access all the details from the hard disk, the forensic investigator needs to implement this computer forensic project. Thus, the chief reason for the development of this computer forensic project is to assist the investigators in easing the procedures of the investigation. Therefore, the computer project is about how the forensic investigator is capable of obtaining and easily retrieves data from any hard disk of a computer system to be utilized in the investigation procedures. The investigator will find this project extremely helpful to him and also to the court when handling any form of forensic cases. Thus the project focuses majorly o the improvement of the hard disk devices. Additionally, this project will focus on the fundamental process of retrieving information from a given hard disk device. Thus it will utilize programs like the ASCII coding systems and other forensic tools (Huebner, 2010). IV. Target Customer Base The main objective of this project of computer forensics is targeting mainly the clients. It majorly aims at assisting the parties involved in any form of forensic investigation. For instance, it focuses on the forensic investigators, the clients, and also the court and the authorities’ involved during the process of forensic investigations. This project chiefly targets the forensic investigators because they tend to use the computers to access any form of digital information. Thus, the investigators will find this program helpful in their field during the forensic investigation process. For instance, the forensic investigators are capable of retrieving digital information which they can use during hearing of the court cases (Huebner, 2010). V. Business or Technical needs that will be met by the Project The computer forensic project is further designed to meet all the needs that will enable efficient procedures during the forensic investigation. This project will subsequently make the process of forensic investigation to be extraordinarily easier and also faster. Thus the investigator will be able to take lesser time in the procedures involved in collecting of forensic evidences, presenting of the details and furthermore in writing of the final reports. Additionally, the software will enable the investigator to access all the data in the computer. Additionally, the project will enable the forensic investigators to obtain the required evidences without much difficulty. More over the investigators have an assurance that the evidence obtained are not to be compromised or even altered at any time, thus the evidences are competent and ready for use during court proceedings (Huebner, 2010). VI. The Boundaries of the Project- what the Project will not Address Although the computer forensic project is aimed at delivering an effective means of solving al the problems faced during the forensic investigation, there are some of the drawbacks that the project will not be capable of achieving. These setbacks include the accessing of information only contained in the hard disk alone and not in the other storage devices of a computer (Huebner, 2010). VII. Detailed Implementation of the Project There are numerous procedures in which this technique can be effectively implemented. For instance, one of the techniques that can be implemented is the utilization of a coding standard. The project will further entail application of various techniques that will be capable of recognizing both the structured and the unstructured data in the hard disk. This project works through the identification and also the removal of systems and files that are available in the computer in duplicate forms. Secondly, the user is given a chance to try and insert or even remove any part of the hard disk. Subsequently, the investigator tries to identify any region of the hard disk that might be containing any form of textual data for instance the ASCII. Later on, the investigator who is also the user of the software is to index the hard disk by utilizing the appropriate tool. Eventually, the user presents a familiar and a friendlier and also a more powerful interface to search the hard disk (Solomon, Rudolph, Tittel, Broom, & Barrett, 2011). VIII. The Coding Standards This coding standard includes the use of a unique naming system of conventions, the style of the coding system. The project utilizes the coding system of ASCII. This coding system is significant to this project because it works by converting the analog into the digital form and furthermore it converts the digital to the analog forms (Mohay, 2003). IX. Version Control Policy The project uses a version control policy that ensures that there is easy conversion of information from one form to the other. This act enables the project to work effectively through the implementation of a given set of software program (Mohay, 2003). X. List of the Necessary Hardware Components Requirements for the User While carrying out this computer forensic procedure, there are necessary hardware components that ought to be utilized by the user to attain the required outcome. Some of the hardware is the hard disk, the control unit, also the keyboard, the mouse, and also the monitor, the power supply system (Maras, 2012). Moreover, the scheme enables the utilization of a variety of tools for the data analysis. The software comprises of an ample digital forensic tools specifically created for use by the hard drive. These tools are utilized majorly to examine the hard disk drives of the computer. Some of these tools include the chat examiner, also the e-mail examiner, the network examiner, and also the text searcher, the registry analyzer, and also the forensic sorter. For instance, the forensic sorter is utilized in the sorting of the entire sections of a give hard disk of the computer. This action happens when the tool sorts all the files contained in the selected hard disk drive. Thus some of the files that the tool is competent in sorting are the documents, the images in the hard drive, as well as the archive. Moreover there is the tool of forensic replicator. This tool works by completing all the bit acquisition in the hard drive systems. Additionally, there is the passware kit for the forensic purposes. This one works through the breakage of passwords for the encrypted files in the hard drive of a computer. Subsequently, there is the explorer free tool that works by mounting any form of forensic images as an example of a virtual drive in computers. Finally, there is the lockdown tool that works by locking almost all the available hardware devices of the computer so as to offer adequate protection of all the evidences contained in the computer hard drive systems (Maras, 2012). XI. An Estimate of Timeline Completion of the Project The chief program that is the graphics programming is capable of searching the type of information that the investigator needs. The program accomplishes this task through searching of the required data according to the set timeline. Subsequently, the information tends to appear on the visualization section thus allowing the investigator to view the information he is looking for. The creation of a set of timeline is extremely essential in that it enables the investigator to find the essential details from the computer with ease. For instance, the data can be presented in a timeline through the utilization of pixels that will represent the events. Moreover, there is the timeline that is set to correspond with the time like hours or even minutes. Thus, the investigator is capable of visualizing the timeline in an easy manner (Maras, 2012). XII. Significant Risks that may Impact the Project Although this project has a significant importance to the user, it also displays some of the negative impacts and risks. For instance, there is the risk of the project being cracked down by the unauthorized individuals. The crackers might be capable of accessing private information of individuals stored in the hard disk (Maras, 2012). XIII. Conclusion and Justification of the Project In conclusion, this computer forensic project is of great importance in the field of forensic science. This is because the software enables the investigator to conduct the investigation process efficiently. This project further enables the forensic investigator to collect the required forensic evidences and analyze them comprehensively without compromising the integrity of the evidences. XIV. References Huebner, E. (2010). Open source software for digital forensics. New York, NY: Springer Publication Maras, M. (2012). Computer forensics: cybercriminals, laws, and evidence. Canada: James and Bartlett Publishers. Mohay, G. (2003). Computer and intrusion forensics. Massachusetts, MA: Artech House Publication. Solomon, M., Rudolph, K., Tittel, E., Broom, N., & Barrett, D. (2011). Computer forensics jumpstart. Indiana, IN: John Wiley and Sons Publication. Volonino, L., & Anzaldua, R. (2009). Computer forensics for dummies. Indian, IN: John Wiley and Sons Publication. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Software development practice Research Paper Example | Topics and Well Written Essays - 2000 words”, n.d.)
Software development practice Research Paper Example | Topics and Well Written Essays - 2000 words. Retrieved from https://studentshare.org/information-technology/1435819-software-development-practice
(Software Development Practice Research Paper Example | Topics and Well Written Essays - 2000 Words)
Software Development Practice Research Paper Example | Topics and Well Written Essays - 2000 Words. https://studentshare.org/information-technology/1435819-software-development-practice.
“Software Development Practice Research Paper Example | Topics and Well Written Essays - 2000 Words”, n.d. https://studentshare.org/information-technology/1435819-software-development-practice.
  • Cited: 0 times

CHECK THESE SAMPLES OF Software Development Project Easy Retrieval of Data from Hard Disk Drives

System Architecture & Design

The researcher of this study also solves of a specific domain problem in the hard disk drive and presents the analysis of the domain.... The design of the hard disk drive, that is created in the research paper acts as a system solution provider for the users.... The hard disk design addressed is easy to use and has an easily understood design.... The design utilizes the technique of the input the process and finally the output of data....
7 Pages (1750 words) Research Paper

Forensic Software Testing Support Tools (FS- TST)

This paper ''Forensic Software Testing Support Tools (FS- TST)'' explains the measures and procedures that the software tools should follow to perform its functions effectively, for instance the function of copying and also the imaging of the hard disk drives.... The document explains the measures and procedures that the software tools should follow to perform its functions effectively, for instance the function of copying and also the imaging of the hard disk drives....
10 Pages (2500 words) Research Proposal

Computing platforms

… The Computers for African Schools Charity obtains redundant PC equipment from a variety of sources within the UK.... This report aims to provide an understanding of the state of the art on issues that are to be considered for deployment of redundant hardware resources in UK for teaching of IT skills in the secondary schools at various locations in Africa using the Linux Operating System....
33 Pages (8250 words) Dissertation

Product Survey Project

he 750 GB hard disk purpose is storage function, its large volume helps store voluminous information that is vital to the organization and for installing many softwares (Chen, 2006).... he external hard disk is for securely storing vital firm information that may... A design graphic card enables relaying of detailed graphics to the monitor from the central processing unit.... he 8gb random access memory acts as main memory where application soft wares and programs data are temporarily stored during processing....
3 Pages (750 words) Case Study

Easy Retrieval of Data from Hard Disk Drives

The paper " easy retrieval of data from hard disk drives" presents a software development project for computer forensics.... Consequently, there is a great significance in the development of a software program for easy and quick retrieval of data contained in the hard disk.... The proposed project is based on a software program that can easily retrieve any specific data from the hard disk drive of any computer.... This is because the hard disk acts as a form of storage device for the computer....
7 Pages (1750 words) Term Paper

Quality Insurance of the Forensic Software Testing Support Tools

The paper " Quality Insurance of the Forensic Software Testing Support Tools" proposes a test plan for the project on the development of a hard disk drive" a summary of the quality insurance objectives as well as the quality metrics,  the areas of the application that will be undergoing testing.... he quality objective for the application of the quality metrics on the hard disk drive is extremely important.... Another objective of this test is to accurately define the chief sources of the data as well as information that was in use during the preparation....
11 Pages (2750 words) Term Paper

Advantages of Virtualization Software

Virtualization is a means of separating hardware from a particular operating system.... VMware Workstation includes all the features of VMWare Player including hardware optimization, easy virtual machine creation, driver-less guest OS printing as well as adding in the capability to replicate machines, take numerous snapshots of the guest Operating System, as well as a replay of all the changes that have been made to the guest Operating System for testing software and recording the results within the virtual machine....
8 Pages (2000 words) Essay

The Basics of Cloud Computing

Furthermore, if VMS is going to run I/O intensive application, it is going to put a lot of pressure on the disk, and other application associated with the storage may experience efficiencies problems as a result of resource contention currently experience in the company (Lowe, & Ridgway, 2001).... Another common aspect is memory ballooning and swapping, and it is associated with disk performance.... Whenever a VM runs out of physical memory, it is typically moved from page to disk, which causes more problems as it tries to squeeze through to fit in their data, storage I/O is going to be greatly affected because it cannot accommodate the request by the user (Hauser & Clausing 2008)....
18 Pages (4500 words) Report
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us