Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
Tutorial for Masters.doc
Скачиваний:
0
Добавлен:
01.07.2025
Размер:
1.94 Mб
Скачать

I. Read the text. Choose the most suitable heading from the list (a-g) for each part (1-5) of the text. There are two extra headings which you do not need to use.

  1. Forensic computing as a recognized discipline.

  2. Magnetically stored or encoded evidence.

  3. Steps taken in forensic investigation.

  4. Other types of digital information useful for forensic computing.

  5. Specialized software for forensic experts.

  6. Specialized hardware for forensic experts.

  7. Areas of forensic computing appliance.

II. Read the text. For statements (6-15) choose “True” if the statement is true according to the text, “False” if the statement is false:

  1. Forensic computing is still a pseudoscience nowadays.

  2. Forensic techniques are used in a wide range of digital media.

  3. The experts use different techniques to work with digital evidence.

  4. Forensic computing deals with any criminal activity.

  5. Forensic investigators should keep a complete audit trail of the steps taken in the preceding processes.

  6. Digital information should include file time, date stamps, folder structure hierarchies.

  7. Things to be careful about are changes in the media of the electronic device.

  8. Trojan horse or time-bomb malware are left behind to purify data.

  9. Experts usually have operating systems, data recovery software and commercial firewalls.

  10. Experts build their own scripts and tools to investigate.

III. Read the text. For questions (16-20) choose the correct answer (a, b, c or d).

  1. Forensic techniques are applied in…

  1. digital computers.

  2. various equipment.

  3. device connected to the Internet.

  4. a wide range of digital media and equipment.

  1. … evidence is used in forensic computing.

  1. Analogue.

  2. Analytical

  3. Digital

  4. Investigative

  1. An expert should be wary of…

  1. changes and activation of malware.

  2. alternatives and Trojan horse.

  3. message transmission tags.

  4. digital media.

  1. The forensic examiner's set of instruments usually includes operating system utilities for…

  1. Trojan horses.

  2. turnkey assistance.

  3. backups and disk manipulations.

  4. data recovery software.

  1. Experts may build their own scripts and tools in order to…

  1. complete with case management tracking for procedures.

  2. complete string searches.

  3. view files.

  4. provide specialized investigations.

IV. Match (21-30) with their definitions (a-l). There are two definitions that you do not need to use.

21.

recent

A.

further along in space or time or degree

22.

to evolve

B.

to perform an act, usually with a negative connotation

23.

a guideline

C.

programming software designed to disrupt or deny operation

24.

a range

D.

the act of getting something back to a satisfactory state

25.

to identify

E.

a rule or principle that provides guidance to appropriate behaviour

26.

evidence

F.

of the immediate past or just previous to the present time

27.

to commit

G.

all the means by which any alleged matter of fact whose truth is investigated at judicial trial is established or disproved

28.

via

H.

to undergo an evolution

29.

a restoration

I.

to recognize as being

30.

malware

J.

a variety of different things or activities

K.

to keep in perfect or unaltered condition

L.

by the way of

Supplementary Tasks :

Соседние файлы в предмете [НЕСОРТИРОВАННОЕ]