ISEDJ

Information Systems Education Journal

Volume 12

V12 N5 Pages 23-36

September 2014


Data Storage Forensics – What is Really Left After I Hit the Delete Button, and How Can I Actually Make Sure It’s Gone?


Anthony Serapiglia
St. Vincent College
Latrobe, PA 15650, USA

Abstract: The following Teaching Case is designed to expose students to three scenarios related to data stored on hard drives, techniques that could be used to retrieve deleted or corrupted data, and a method for a more thorough deletion of data from a hard drive. These issues are often overlooked in current IT curriculum and in our age of digital clutter this can be a dangerous oversight leading to potential financial loss, exposure to identity theft, and criminal liability. This case study / lab exercise can be utilized in multiple levels of a CS/IS curriculum, adjusted to meet the skill and background levels of introductory courses to specialized capstone courses in hardware or security.

Keywords: Data Recovery, forensics, Privacy, Security

Download this article: ISEDJ - V12 N5 Page 23.pdf


Recommended Citation: Serapiglia, A. (2014). Data Storage Forensics – What is Really Left After I Hit the Delete Button, and How Can I Actually Make Sure It’s Gone?. Information Systems Education Journal, 12(5) pp 23-36. http://isedj.org/2014-12/ ISSN: 1545-679X. (A preliminary version appears in The Proceedings of ISECON 2013)