Chain of Custody

Assignment Help Basic Computer Science
Reference no: EM132785797

You are a digital forensics intern at Azorian Computer Forensics, a privately owned forensics investigations and data recovery firm in the Denver, Colorado area. Azorian has been called to a client's site to work on a security incident involving five laptop computers. You are assisting Pat, one of Azorian's lead investigators. Pat is working with the client's IT security staff team leader, Marta, and an IT staff member, Suhkrit, to seize and process the five computers. Marta is overseeing the process, whereas Suhkrit is directly involved in handling the computers.

The computers must be removed from the employees' work areas and moved to a secure location within the client's premises. From there, you will assist Pat in preparing the computers for transporting them to the Azorian facility.

Chain of Custody

Evidence is always in the custody of someone or in secure storage. The chain of custody form documents who has the evidence in their possession at any given time. Whenever evidence is transferred from one person to another or one place to another, the chain of custody must be updated.

A chain of custody document shows:

What was collected (description, serial numbers, and so on)

Who obtained the evidence

Where and when it was obtained

Who secured it

Who had control or possession of it

The chain of custody requires that every transfer of evidence be provable that nobody else could have accessed that evidence. It is best to keep the number of transfers as low as possible.

Chain of Custody Form

Fields in a chain of custody form may include the following:

Case

Reason of evidence obtained

Name

Title

Address from person received

Location obtained from

Date/time obtained

Item number

Quantity

Description

For each evidence item, include the following information:

Item number

Date

Released by (signature, name, title)

Received by (signature, name, title)

Purpose of chain of custody

For this assignment:

Walk through the process of removal of computers from employees' work areas to the client's secure location and eventually to the Azorian facility. Who might have possession of the computers during each step? Sketch a rough diagram or flow chart of the process.

Each transfer of possession requires chain of custody documentation. Each transfer requires a signature from the person releasing the evidence and the person receiving the evidence. Include the from/to information in your diagram or flow chart.

Reference no: EM132785797

Questions Cloud

Two new auditing roles in Oracle : Discussing the reasons for the two new auditing roles in Oracle 12c. Why did Oracle consider them necessary?
KNN Regression : Each of the K neighbors has an influence that is inversely proportional to the distancefrom the point
Compute maximum flow for the new network : Give efficient algorithm to compute a maximum flow for the new network. What is the worst case time complexity of your algorithm?
Develop risk management plan : Apply the competencies gained in the lessons of this course to develop a risk management plan for a fictitious organization to replace its outdated plan.
Chain of Custody : You are a digital forensics intern at Azorian Computer Forensics, a privately owned forensics investigations and data recovery firm in the Denver,
Dissertation Discussion : Your chosen research design must address reliability and validity issues. How will you insure the measures you are using are valid and reliable.
Sequences and series to solve engineering problems : Using sequences and series to solve engineering problems - Examine how matrices, determinants and complex numbers can be used to solve engineering problems
Identify different types of diode : Identify different types of diode and their uses and Construct a schematic diagram and simulate the operation of a diode as a half-wave rectifier
Develop the circuit schematic and simulation : Explore the safe operation and applications of analogue devices and circuits that form the building blocks of commercial circuits

Reviews

Write a Review

Basic Computer Science Questions & Answers

  How are the files and folders on storage device organized

Organize Files on a Storage Device Using Folders Organizing the files on a storage device not only can improve your computer's performance.

  Shell script programming tips

A great opportunity for us to share what we know and discuss some of our shell script programming tips with each other. For this discussion, compile a list of at least 10 shell script programming tips. You may need to perform some research from credi..

  Implement an algorithm to solve dutch national flag problem

The task is to arrange the pebbles so that all reds occur before all whites which in turn occur before all blue pebbles. Design and implement an algorithm to solve the Dutch national flag problem.

  Describe two types of variables or methods

Describe two types of variables or methods that can be used to exchange data between web pages and give example code of both types.

  Commission rate based on the value of the car sale

For each car sale, salesperson will receive 30% commission rate based on the value of the car sale.

  Find the names of five different cyber viruses

Use a search engine to find the names of five different cyber viruses.

  How we can apply regression analysis to business situation

Consider how we can apply regression analysis to a business situation. Let's take company sales as an example.

  The potential benefits of purchasing cyber insurance

Cyber Insurance-Many organisations are investigating the potential benefits of purchasing cyber insurance. Security Issues with 'Shadow IT' and BYOD.

  Explain findings-conducting internet search for for cde file

Network asminisrator mentions that other "CDE" files have been sent through the FTP server to another site. Explain your findings after conducting the internet search for "CDE" files.

  Determine the eigenvalues of kn

How to determine the eigenvalues of L(P) in the following stages: - determine the eigenvalues of Kn - determine the eigenvalues of L(K5)

  Document using a word processing program

Would rearranging the paragraphs in a document using a word processing program be an editing operation or a formatting operation? Explain your answer.

  System administration automation

System Administration Automation

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd