Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

1. Convert the following requirements to a data flow diagram DFD. DFD should include levels 0, 1, and 2 diagrams. 2. Translate DFD to a system hierarchy diagram.
E-Discovery System
1. Extractiona. No catalog files are available for recovery of tapesb. Extraction metricsi. Number of tapes processed successfullyii. Tapes initially reporting problemsiii. Tapes that are subsequently sent to "Problem Tape Data Recovery"c. The Extraction processi. Managed by recording1. The box the tape was delivered in2. The source tape barcode3. Result of Extraction a. completedb. re-readc. sent to Problem Tape Data Recovery (Special Case Media)4. Support the evidentiary chain of custody5. Support the tape problem resolution (e.g., whether bad tapes are from a specific box, system, archive tool or tape type). ii. Evidentiary audit trail that allows for all data that resides in the E-Discovery system1. traced back to source data2. not duplicate dataiii. Recover all tape data and files with the exception of system and non-user filesiv. Preserve all original source datad. Ingesti. The evidentiary chain created in the Extraction step will continue in the Ingest step. ii. The lineage of files will continue to be sourced back to the tape of origin and box of tapes. iii. Ingest metrics will include number of files provided from Extraction to Ingest iv. Identify1. Identify the number of files that are relevant2. Identify the number and types of files that are not currently addressed in current file rulesv. The system will keep all data unless it is clear that it is not a relevant data type vi. If Ingest rules are incorrect, the Ingest can be re-run on the stored filesvii. The relevant file store1. The basis for the De-Duplication2. Acts as the Ingest data protection point. viii. The contractor shall ingest these files into an archival storage system.ix. De-duplication1. Will be performed as part of the Ingest process2. The duplicate will be stored on the E-Discovery system. 3. The De-Duplication actions will be recorded and used for both confirmation and a metric to anticipate growth for the final evidence data extraction system configuration. 4. De-Duplication metrics will include number of files provided by Ingest, number of files archived (ingest number minus duplicates) and the file type-to-duplicate ratio. 5. De-duplicate all files with the exception of Operating System and non-user files2. Data storage a. Complete and accurate collection of all files for user search and use b. Data storage for an evidence data extraction system also includes archive and backup of the system and data. c. Metrics for data storage shall includei. total space availableii. space used for intermediate storageiii. space used for final file storageiv. space used for index storaged. On approximately 7,000 tapes the contractor shall i. restore all file dataii. de-duplicate the files that are on e. Ability to implement access control measures on all dataf. Additional tapesi. expected to result1. at a rate of approximately 200 a month2. until the E-Discovery system is installedii. need to be incorporated into the E-Discovery system.3. Data Indexing a. The contractor shall maintain an index capability that includes i. but is not limited to1. emails2. attachments3. audio4. video5. images6. affiliated metadata ii. a full boolean phrase searchb. The contractor shall provide capabilities to keep both the Ingest mission running and the search performance effectivei. Initialii. Incrementaliii. Re-indexing. 4. Data Queries a. The contractor shall provide a solution with a single user web interface between the production and tape data restoration environment. b. The web-based interface will provide multi-variable boolean searches returning ranked results. c. All data require media metadata extractioni. Emailii. Videoiii. Audioiv. Still imagesv. Other Electronically Stored Information (ESI) d. The contractor shall be required to provide the captured metadata associated with the above-defined files in a fully searchable index. e. The contractor shall be required to provide full integration of image metadata into the fully searchable index. 5. Special Case Media Recovery a. All bad, damaged, or erroneous data will be treated as a separate processing thread. b. This separate thread is to be segregated so as not to interrupt the ongoing workflow, and the efficiency of the standard processing of the rest of the tapes in the collection. c. The actual fault with the media will be identified, the likelihood of success for recovery will be established, an estimation of the degree of effort required for recovery will be made, and a report will be generated so that the customer can determine whether the restoration effort should be executed. d. Successful recovery will be documented and, to the extent possible, unrecoverable information will be logged. e. Data that has been successfully recovered will then be moved into the standard recovery processing chain fori. de-duplicationii. ingestioniii. indexing.f. The tape recovery process for special case media involves salvaging data from inaccessible storage tape. g. There may be physical tape failure caused byi. media flaws and a loss of media alignment ii. logical tape errors caused by 1. internal data corruption2. damaged catalog dataiii. an application-related error due to the software utilized during the backup routine. h. The contractor shall identify the actual fault with the mediai. identification of the specific type of error (type of issue encountered)ii. the extent of the errors or damage to the mediaiii. minimal handling 

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M996823

Have any Question?


Related Questions in Computer Engineering

About signed integer representation twos complement

About Signed Integer Representation. Two's Complement Overflow Explain how to perform the signed decimal to Hexadecimal conversion and vice versa. Show it with two examples for each.

Section 1 introduction write an introduction statement

Section 1: Introduction Write an introduction statement introducing the topic that you are interested in exploring. This section should contain the following background: Identify an industry and company profile you wish ...

A new machine averages 4 clock cycles per instruction and

A new machine averages 4 clock cycles per instruction, and runs at a system clock of 20 MHz. The Axiom-Verge algorithm set to benchmark the system will take an even 3000 instructions to complete. a) Knowing how many cloc ...

Question suppose a large aerospace engineering firm has

Question : Suppose a large aerospace engineering firm has immediately hired you as a consultant to investigate a potential violation of corporate policy and data theft. You have been informed that an employee may have be ...

You have been recently promoted to it security manager your

You have been recently promoted to IT Security Manager. Your first job is to document the older hardware and software your company is currently using in the IT department. State the strengths and weaknesses with the curr ...

The current price of dumbas common stock is 25 per share

The current price of DUMBA's common stock is $25 per share. You plan on buying it today, holding it for 4 years, and then selling it. You anticipate receiving a dividend per share of $1.00 one year from today, $2.00 two ...

Do you believe corporation pose as a risk to our national

Do you believe corporation pose as a risk to our national economy and to domestic employees based upon external shocks to our economy as well as government regulations and Obamacare?

Assume the following information for an imaginary closed

Assume the following information for an imaginary, closed economy. GDP = $100,000; taxes = $22,000; government purchases = $25,000; national saving = $15,000. Refer to Scenario 26-1.  For this economy, investment amounts ...

Question suppose we have two binary search trees b1 and b2

Question : Suppose we have two binary search trees B 1 and B 2 Give an algorithm to merge B 1 and B 2 into a single binary search tree, and runs in time linear in the sum of the sizes of the two trees. Give good justific ...

Recall that one of the ways to randomize an algorithm that

Recall that one of the ways to randomize an algorithm that operates on an array is to "shuffle" the array -- i.e., randomly permute it. Give an algorithm that randomly permutes an input array A. What is the run-time of y ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As