How should a report account for uncertainty and error analysis??

What will be an ideal response?


In digital forensics, many results can be absolutely true if stated conservatively but might be a guess if you overreach. Therefore, a statement of limitations of knowledge and uncertainty is necessary to protect your credibility. For example, if you're using the timestamp for a file in a Windows OS to indicate that the file was created at a certain time, you need to acknowledge that a PC clock could be reset easily. In addition, you should state that there's no absolute assurance that a file's timestamp is a reflection of its creation time, but there might be other reliable indicators, such as timestamps of other files, creation timestamps for directories, creation order of certain files, and information in automatic backups.

Computer Science & Information Technology

You might also like to view...

In a class definition, if the word Private appears before a field declaration, Private is known as a(n) __________.

a. access specifier b. mutator c. class specifier d. private specifier

Computer Science & Information Technology

All encryption algorithms are based on two general principles: substitution and ____________ .

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Feedback is most helpful when it is solicited from sources such as ____.

A. content contributors B. objective participants C. clients D. all of the above

Computer Science & Information Technology

The IIf function requires ________ parameters

A) 3 B) 1 C) 0 D) 2

Computer Science & Information Technology