General discussion we held last week

Assignment Help Business Management
Reference no: EM131274196

This week's reading takes you from the general discussion we held last week into some more specific details about the role of both criminal justice and non-criminal justice professionals in the IT and computer forensics world, as well as why it is important that you understand the basic principles and concepts of the criminal justice process.  Then we get into the meat of what you would do and how you would interface with law enforcement in the event you have to conduct a forensic system analysis.  The readings in week 2 again stress the importance of understanding the criminal justice process, as well as discusses different types of devices or file systems that may contain information critical to your analysis.

Among the basic concepts to understand this week are that there are many types of evidence one could find in digital data.  Understanding what data you may find, even if it is not evidence of a crime, is important to preparing a digital examination/analysis plan. Let's look at anon-technical example...

When a law enforcement officer applies for a warrant to search a residence, the officer must specify for what it is he or she is searching; if the case involves a stolen car, then the officer's search will be limited to only those locations a stolen car, or pieces of a stolen car (in case it was chopped), could be located. It would be unwise to just list the stolen car on the warrant, as (in the interpretation of the court) might only limit the officer to the whole car, intact.  So, the officer has to determine at the outset of their search what could have happened to the car (attempting to account for all the possibilities) so his or her search is complete (and most likely to yield results).  The officer will also have to justify (in the affidavit) why he or she believes that the car could be found in smaller pieces.  To that end, an officer with auto theft experience may also be able to state that, in his or her experience, stolen cars are often broken down into smaller components, which can be identified with certainty as belonging to the original stolen car, as well as where such components could be hidden.  It would most likely not tbe enough for the officer to simply assert that cars are broken down and sold for parts, if he or she wants to justify seizing an ashtray; the ashtray would need some specific characteristics to do that.

Search warrants and searches are, therefore, most often limited in scope to items for which the searcher is looking (i.e., nearly always evidence of a crime or wrongdoing). You cannot look for an elephant in a kitchen drawer! I know that sounds absurd, but it is an excellent metaphor... However, if you were looking for narcotics, they could be hidden almost anywhere, and you could justify a much broader search.  In this example, digital evidence is much more akin to narcotics than you may think, with evidential data often occurring in hidden, strange, or unlikely places.  As such, warrants to search for digital evidence often cast a "wide net," but cannot be so overly broad as to not be supported by probable cause or violate someone's 4th amendment protections and implied rights to privacy.

Do not despair, however, if you are not a law enforcement officer... The requirement to obtain a search warrant does not apply to searches by private individuals or non-government organizations, as long as the individual(s) have the authority to conduct the search (e.g., IT security personnel are searching a computer owned by their company for company data, or an employee gives the company consent to search for their personal data).  However, even those searches may be limited to certain parts of the computer system(s) or network(s).  As noted in the text, if a person is allowed to use a personally-owned flash drive at work, and that drive is connected to the computer, you still may not be able to search it without the employee's consent.  All of these examples depend heavily on established company policies and what warnings were given to the employee.

The readings this week identifies several types of devices on which digital evidence could be found. For this week's discussion, please list two of the devices provided by the text (or other devices, if you prefer), state what types of evidence you would look for on those devices, and explain what limitations you might have or what hurdles you would have to clear before searching those devices (BOTH as a company IT professional and a law enforcement officer).  Identify what, if any, policies would need to be in place for you to search as a private employee, as well as what limits can be placed on the search by police. Please discuss thoroughly, and respond in a substantive, intelligent way to at least one of your fellow classmates.

Reference no: EM131274196

Questions Cloud

Strong mathematical induction : A sequence a0, a1, a2, . . . is de?ned recursively as follows: a0 = 2 a1 = 9 ak = 5ak- 1 - 6ak- 2 for all integers k ≥ 2. Use strong mathematical induction to prove that for all n ≥ 0, an = 5 · 3n - 3 · 2n.
What suggestions do you have to address these concerns : Because many assessments and inventories are now available and completed online, counselors need to be aware of the issues related to the use of technology in career counseling. What are some of the concerns that you should be aware of when using ..
Canadian business law article assignment : The purpose of this assignment is to develop students' understanding of significant issues in Canadian business law and to further their research and analytical skills. Students will select and analyze one current article on an important topic in Can..
What would you want michael clark to do next : What would you want Michael Clark to do next? In this scenario, what is the technician assuming about the user's skill set?
General discussion we held last week : This week's reading takes you from the general discussion we held last week into some more specific details about the role of both criminal justice and non-criminal justice professionals in the IT and computer forensics world, as well as why it is..
Is your organization governed by a board of directors : Is your organization governed by a Board of Directors? If so, what do you know about the Board?
Finalize project schedule and mitigate any delays : Three of the areas of the project affected by the events should include changes to budget, human capital, and impact to schedule, and identify one additional area affected by these events.
Describe advantages associated with using each given cable : Describe one or two of the advantages and/or disadvantages associated with using each cable type for a business's network infrastructure.
Determining the database life cycle : Per the text, the Database Life Cycle includes the Database Initial Study, Database Design, Implementation and Loading, Testing and Evaluation, Operation, and Maintenance and Evolution phases. However, the actual implementation of each of the phas..

Reviews

Write a Review

Business Management Questions & Answers

  What is trust on an insecure networkif one considers a more

what is trust on an insecure network?if one considers a more complex case where modern business changes so quickly and

  Describe importance of organizational climate and motivation

Write an essay describing how a leader might utilize the Kelley model of followership to assess follower effectiveness, and discuss how this leader might develop this individual into a more effective follower.

  Represent a range of reactions

1. Would you describe yourself as multiracial, or do you see yourself as belonging to a single race? Why? 2. Have you or any member of your family ever encountered a glass ceiling? Explain. 3. As you read the following scenarios that represent a ran..

  Provide information about whom questions should be directed

Write a procedural email message to employees reminding them of standard operating procedures or organizational changes that take the form of step-by-step instructions. Provide information about where and to whom questions should be directed.

  Strategic entrepreneurship

Recognize and discuss some of ways that Amazon.com has demonstrated strategic entrepreneurship and innovation. Apply the terms invention, innovation, and imitation to Kindle.

  Question 1i total quality management tqm has been coined to

question 1i total quality management tqm has been coined to describe a philosophy that makes quality the driving force

  Create and enable chaos as well as a clear sense

In 150 words or more hypothesize why it is important for leaders both to create and enable chaos as well as a clear sense of purpose in organizations.

  Identify and explain your competitors

Discuss the following: Identify the small business and the type of product that will be introduced internationally. Choose a country you will first introduce the product

  Characteristic of the homo economicus

What is a central characteristic of the homo economicus ("economic man") assumption of decision making in economics? a. In making decisions, people should take into account the costs of services they receive

  Estimated revenues and expenses before tax

The processor useful life is expected to be 5 years and its salvage value at that point is estimated to be $25,000. Estimated revenues and expenses before tax for each year are shown in the table below.

  Compare and contrast contemporary business versus

Business Sustainability Plan-Compare and contrast Contemporary Business versus an emerging Social Business concept. Identify and describe current business trends to include outsourcing, off-shoring and globalization

  Analyze the organizational structure of your organization

Analyze the organizational structure of your selected organization. Differentiated the structure of the selected organization from two different organizational structures.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd