Imagine you’ve been sought out as a guest lecturer at a local university for a computer forensics course. You have been asked to prepare a paper for the students, as well as a PowerPoint presentation, regarding data acquisition in a forensics investigation.
Part 1: Written Paper
a. Analyze the four (4) methods of data acquisition to determine how an investigator selects the appropriate method to use in a given situation.
b. Determine how an investigator can plan for hardware, software, and / or general failures during data acquisition.
c. Justify the necessity of validating data acquisition and determine the negative effects on an investigation if this step is not performed.
d. Describe the acquisition procedures and tools for Windows and Linux data acquisitions.
e. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resource