Question: When disaster strikes - whether it be due to a natural disaster, a catastrophic failure, or the actions of a disgruntled employee - it is
When disaster strikeswhether it be due to a natural disaster, a catastrophic failure, or the actions of a disgruntled employeeit is important to have a plan already in place with clear documentation about how to quickly recover. A good disaster recovery plan includes clear objectives, identification of who is involved, detailed documentation of the network infrastructure, and clarity on the data recovery technique, as well as documentation and testing of the procedures outlined.
For this realworld exercise, you will put your readings and research to use by creating a data recovery plan and a password recovery procedure. You will use the hypothetical scenario below as the setting and context for this activity.
Upon successful completion of this assignment, you will be able to:
Create a data recovery plan and a password recovery procedure.
Background Information
Scenario
You are a computer forensics intern at AAA Computer Forensics, a small forensics investigations and data recovery firm. Today your manager receives a call from a client in the construction industry. The client reported that a disgruntled employee reformatted a hard disk that contained valuable blueprints for a current job. The computer is an ordinary laptop that was running Windows Vista. No backup is available. The client wants that data to be recovered and at the same time has requested that you create a procedure for using an appropriate passwordcracking method. You have been asked to assist in the recovery of the data and to crack passwords.
SelfAssessment Checklist
You will know that you have successfully completed this challenge when you can answer the following selfcheck questions affirmatively:
I have researched and identified the appropriate steps for recovering data from a reformatted hard disk.
I have properly outlined each step in the data recovery process in correct order.
I have selected an appropriate password recovery method.
I have accurately documented the password recovery method.
Instructions
Review the rubric to make sure you understand the criteria for earning your grade.
Review the following material:
a Chapters & in your Guide to Computer Forensics and Investigations textbook
b Webpage: Most Popular Password Cracking Tools
Using MS Word, prepare the following data and password recovery documents:
a Data Recovery Plan: Create a data recovery plan outline that lists the steps to be performed in recovering the data in their order of importance.
b Steps for Recovering a Password: Create a document that lists the steps for recovering a password from a Windows Vista, Windows or Linux system.
i Identify which software tools you would advise be used for password cracking and why. NOTE: The software used should be open source
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
