Describe steps in a process to collect digital evidence

Assignment Help Management Information Sys
Reference no: EM131725542

This week (and past weeks) your reading focuses on the techniques and tools you would use to collect, preserve, and analyze digital evidence.

While this class does not focus as heavily on the highly technical aspects of digital forensics (e.g., using the tools, techniques, processes to collect, preserve and analyze digital evidence), it does stress how to be prepared for the digital evidence process, as it fits into the criminal justice system.

Of course, it is critical that computer forensic examiners understand processes such as capturing volatile data, recognizing and collecting digital evidence, analyzing the evidence once it is collected, etc.; however, what I want you to focus on this week is why and how the processes are designed to identify, seize, collect, preserve, and analyze digital evidence, and how they relate to the criminal justice process.

You should all understand the need to verify what a warrant will allow you to search for and seize in a criminal case (ensuring that you do not exceed the scope and potentially compromise your case). You should also be aware of what a company's policy, or an organization's leadership will allow you to do in a non-criminal justice investigation.

In either case, you need to be able to testify about all the steps you took, articulating from the point when you were first notified of the incident or called in to collect the digital evidence, until the time you are called to testify about it.

Digital evidence must not just be simply collected (e.g., picked up and put in a bag), but procedures must be put in place to preserve the evidence so the defense cannot raise reasonable doubt (in the criminal case) about the integrity or provenance of the evidence.

For this week's discussion, complete the following questions below in detail. Please discuss thoroughly and substantively in your post. Additionally, respond in a thorough, substantive, intelligent way to at least one of your fellow classmates that adds to our discussion and learning of this week's topic!

1) Describe at least 5 steps in a process to collect digital evidence to the time you testify that you consider important. Please explain why they are important.

2) You are a witness and I am asking you the following question - please answer thoroughly as if you are testifying in court on the witness stand. "Upon entering the room where the computer was located, what was the first thing you did?"

3) Continue your testimony by answering - "After seizing the computer evidence, explain what you did with it?"

Reference no: EM131725542

Questions Cloud

Annual ordering and holding costs for each inventory : What is the optimal order size and frequency for Ford? For GM? What is the annual ordering and holding costs for each inventory?
Design the EDS would you make any changes : Design the EDS, would you make any changes to the way the ship functioned? Why or why not? Explain your answer in three to five sentences including examples
What are the two most common http request types : What are the two most common HTTP request types (also known as request methods)?
Analyze the log to determine the percentage of traffic : Collect a log of all traffic entering your site. Analyze the log to determine the percentage of traffic that arrives from or is destined to a well-known.
Describe steps in a process to collect digital evidence : Describe at least 5 steps in a process to collect digital evidence to the time you testify that you consider important.
Effectiveness of the intelligence community : Recommendations to reorganize improved or did not improve the effectiveness of the intelligence community in protecting the nation from terrorist attacks.
Compare the result to the time required for the transfer : If encryption software is available on your computer, measure the time required to encrypt a 10 Mbyte file, transfer it to another computer, and decrypt it.
Compute the basic earnings per share : Basic and diluted EPS. Compute the basic earnings per share for 2018. Compute the diluted earnings per share for 2018. (Round to the nearest penny.)
Determine the smtp transfers messages in ascii : Survey users at your site to determine if they send sensitive information in e-mail. Are users aware that SMTP transfers messages in ASCII.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Ascertain the importance of information management

Ascertain the importance of information management for the company or industry that you have chosen. Use at least three quality references.

  What is erp system architecture

What is ERP system architecture? And what is necessary for the ERP implementation to be successful?

  Question 1a classify the subsequenta presentation serverb

question 1a classify the subsequenta. presentation serverb. application serverc. database serverd. software application

  Organizations are becoming more socially conscience or

organizations are becoming more socially conscience or less?do you think organizations are becoming more socially

  Develop the review and modification policy portion of isp

Develop the review and modification policy portion of your ISP to ensure it is a ‘living document'.

  This post addresses decision support systemssome experts

this post addresses decision support systems.some experts claim that if a business gets 52 percent of its decisions

  Explain how disney uses move it shake it celebrate it

Explain how Disney uses "Move it! Shake it! Celebrate it!". How are information systems improving operations at Disney? Give an example of two management decisions that are improved and streamlined by Disney's information systems

  Is password sharing an acceptable behavior

Is Password Sharing an Acceptable Behavior? Write a 1- to 2-page paper discussing whether you agree or don't agree with him.

  Describe the nature of information system you have selected

Describe the nature of the information system you have selected. Describe the organization that owns and maintains the information system. Describe the existing business process that this system will address.

  Describe the impact of telecommuting on energy conservation

Describe the impact of telecommuting on energy conservation, IT operational costs, "green computing", and shifts in telecommuters' lifestyles (e.g., parents, disability, etc.).

  Who is ultimately responsible for managing a technology

What are the differences between a policy, a standard, and a practice? What are the three types of security policies? Where would each be used? What type of policy would be needed to guide use of the Web? E-mail? Office equipment for personal use?

  Describe about the planning the dblc

The development of a database requires thorough methodology that ensures quality within the solution. Imagine you have been contracted to develop a finance database that will help an organization track monthly expenditures by departments. Using th..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd