Case Scenario: By accident James deleted the files on the main storage device, and it was discovered later that there was a possible intrusion from the packets flow.
Q1. Discuss how data would be retrieve from the source storage device (using Scenario above)
Q2. Discuss how would you extract data from the source data storage device (using Scenario above)
Q3. What method would you use to create and secured the target data storage devices?
Q4. Discuss the possible image format you would use for data investigation.