Pennsylvania State University

Mark disk blocks as ‘bad’ B. Exceed authorization on disk. Mark volume as shorter than actual C. Hide malware on a disk. Use techniques to hide files D. Make the disk unreadable. Use forensic software Attack Solutions. i. Encrypt disk. Corrupt the disk header ii. Forensic software. Encrypt disk contents iii. Secure Wipe. iv. Antivirus ... ................
................