Chain of Custody

Assignment Help Basic Computer Science
Reference no: EM132785797

You are a digital forensics intern at Azorian Computer Forensics, a privately owned forensics investigations and data recovery firm in the Denver, Colorado area. Azorian has been called to a client's site to work on a security incident involving five laptop computers. You are assisting Pat, one of Azorian's lead investigators. Pat is working with the client's IT security staff team leader, Marta, and an IT staff member, Suhkrit, to seize and process the five computers. Marta is overseeing the process, whereas Suhkrit is directly involved in handling the computers.

The computers must be removed from the employees' work areas and moved to a secure location within the client's premises. From there, you will assist Pat in preparing the computers for transporting them to the Azorian facility.

Chain of Custody

Evidence is always in the custody of someone or in secure storage. The chain of custody form documents who has the evidence in their possession at any given time. Whenever evidence is transferred from one person to another or one place to another, the chain of custody must be updated.

A chain of custody document shows:

What was collected (description, serial numbers, and so on)

Who obtained the evidence

Where and when it was obtained

Who secured it

Who had control or possession of it

The chain of custody requires that every transfer of evidence be provable that nobody else could have accessed that evidence. It is best to keep the number of transfers as low as possible.

Chain of Custody Form

Fields in a chain of custody form may include the following:

Case

Reason of evidence obtained

Name

Title

Address from person received

Location obtained from

Date/time obtained

Item number

Quantity

Description

For each evidence item, include the following information:

Item number

Date

Released by (signature, name, title)

Received by (signature, name, title)

Purpose of chain of custody

For this assignment:

Walk through the process of removal of computers from employees' work areas to the client's secure location and eventually to the Azorian facility. Who might have possession of the computers during each step? Sketch a rough diagram or flow chart of the process.

Each transfer of possession requires chain of custody documentation. Each transfer requires a signature from the person releasing the evidence and the person receiving the evidence. Include the from/to information in your diagram or flow chart.

Reference no: EM132785797

Questions Cloud

Two new auditing roles in Oracle : Discussing the reasons for the two new auditing roles in Oracle 12c. Why did Oracle consider them necessary?
KNN Regression : Each of the K neighbors has an influence that is inversely proportional to the distancefrom the point
Compute maximum flow for the new network : Give efficient algorithm to compute a maximum flow for the new network. What is the worst case time complexity of your algorithm?
Develop risk management plan : Apply the competencies gained in the lessons of this course to develop a risk management plan for a fictitious organization to replace its outdated plan.
Chain of Custody : You are a digital forensics intern at Azorian Computer Forensics, a privately owned forensics investigations and data recovery firm in the Denver,
Dissertation Discussion : Your chosen research design must address reliability and validity issues. How will you insure the measures you are using are valid and reliable.
Sequences and series to solve engineering problems : Using sequences and series to solve engineering problems - Examine how matrices, determinants and complex numbers can be used to solve engineering problems
Identify different types of diode : Identify different types of diode and their uses and Construct a schematic diagram and simulate the operation of a diode as a half-wave rectifier
Develop the circuit schematic and simulation : Explore the safe operation and applications of analogue devices and circuits that form the building blocks of commercial circuits

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd