Volume 12
Abstract: The following Teaching Case is designed to expose students to three scenarios related to data stored on hard drives, techniques that could be used to retrieve deleted or corrupted data, and a method for a more thorough deletion of data from a hard drive. These issues are often overlooked in current IT curriculum and in our age of digital clutter this can be a dangerous oversight leading to potential financial loss, exposure to identity theft, and criminal liability. This case study / lab exercise can be utilized in multiple levels of a CS/IS curriculum, adjusted to meet the skill and background levels of introductory courses to specialized capstone courses in hardware or security. Keywords: Data Recovery, forensics, Privacy, Security Download this article: ISEDJ - V12 N5 Page 23.pdf Recommended Citation: Serapiglia, A. (2014). Data Storage Forensics – What is Really Left After I Hit the Delete Button, and How Can I Actually Make Sure It’s Gone?. Information Systems Education Journal, 12(5) pp 23-36. http://isedj.org/2014-12/ ISSN: 1545-679X. (A preliminary version appears in The Proceedings of ISECON 2013) |