Unit 4 Assignment 1

1197 words - 5 pages

IS4670 Cybercrime Forensics
Unit 4 Assignment 1
Identify Chain of Custody Roles and Requirements

Chain Of Custody
What is chain of custody? Chain of custody is the documentation that identifies the changes in the control, handling, possession, ownership, or custody of a piece of evidence. It’s very important to maintain a chain of custody for evidence especially computer evidence. You must be able to keep track of your evidence from the time you collect it until the time it is to be presented in court or at a corporate briefing. No matter where it takes you.
When collecting the evidence, you will need to tag it with an evidence tag. An evidence tag must ...view middle of the document...

In civil cases, the organization should have a incident response plan that should be followed. Even with civil cases, the federal and state laws related to search and seizure may come into play. If the case relates to fraud, security breaches, or privacy infringements it may become a legal matter.

In both criminal and civil cases, evidence must be:
Legally obtain – Obey the instructions in the search warrant or incident response plan.
Complete – Don’t leave behind computer evidence even if you think it might exonerate the suspect, even if you think the suspect is an awful person. Stay objective.
Reliable – The evidence must be untainted. It should remain unchanged from its original state. Carefully following procedures will help you ensure that computer evidence doesn't get altered, deleted, enlarged, or changed in any way. Maintaining the chain of custody will also ensure that evidence remains reliable.
Authentic – It has to be the real thing, not a fake.
Believable – A jury and a judge (or corporate managers and auditors) need to understand and accept the evidence. Sometimes this is challenging with highly technical computer evidence.
If any of those are not met the evidence could be thrown out and the case could dismissed.
Evaluating, Securing, and Documenting the Crime Scene
First things first: make sure that you are safe. Non-tech savvy people often think of computer crime scenes are nerds or geeks at their laptops. Computers have become part of a crime scene for many reasons being that technology is so prevalent that conventional criminals, as well as terrorists, use computers to plan their crimes. Take for instance when the military went after Osama Bin Ladin, he had computers and hardrives that were collected.
Evaluate the scene for any danger to yourself and co-workers. If need be, make sure to get medical treatment for anyone that may be injured. Police investigators maybe arresting suspects and escorting them off the premises. If that is the case then you must wait till all this is taken care of before clearing the scene of unnecessary people and then walk around the crime scene to get an idea of may have happened. Mark the perimeter of the scene with crime-scene tape and post a guard if it’s necessary.

The next step should be to recognize computer evidence. Technology shows up in all sorts of places. Evaluate the scene for possible places that digital evidence can reside, including:
• Computers

Other Essays Like Unit 4 Assignment 1

Unit 3 Assignment 1

606 words - 3 pages Unit 3 Assignment 1: Networking Models Review 1. Which of the following is true about a TCP/IP network? 2. Which of the following terms is not a common synonym for TCP/IP model? (Choose two answers.) A.D. 3. Think generically about the idea of a networking standard, ignoring any particular standard or standards group. Which of the following is typically true of a standard? (Choose two answers.) B.C. 4. Contrast an

Unit 14 Assignment 1

2804 words - 12 pages Natasha Brown Unit 14 Physiological Disorders Sharon Meadows Contents Physiological disorders, diagnosis and the investigation required to diagnose them. In this assignment I will have an opportunity to provide evidence against the following criteria. P1 – explain the nature of two named physiological disorders. P2 – explain the signs and symptoms related to two names physiological disorders. P3 – Describe the

Composition Ii Unit 4 Assignment

741 words - 3 pages Unit 4 Assignment: Annotated Bibliography Arsianna Walker Kaplan University Thesis Statement: Society does not truly consider the rehabilitation of convicted felons therefore consequentially denying them opportunities. Communities, jobs and housing are key components to living a productive life as a law abiding citizen. Upon release convicted felons face judgments that almost make it impossible for anyone to live. Cesare

Is3120 Unit 1 Assignment 1

792 words - 4 pages Unit 1 Assignment 1 Effects of Routing on Current Communication Methods Used by organizations IS3120 Unit 1 assignment 1 Effects of Routing on Current Communication Methods Used by Organizations Communicating to the consumer is the key element in a successful business. Due to a fast paced world there are modernized techniques that all companies need to adapt and implement when it comes to marketing. There is several ways a company

It255 Unit 3 Assignment 1

1270 words - 6 pages H. Underwood IT255 4/8/13 UNIT 3: Assignment: 1 Remote Access Control Policy 1.0 Purpose The purpose of this policy is to define standards for connecting to Richman Investment’s network from any host. These standards are designed to minimize the potential exposure of Richman Investment’s to damages which may result from unauthorized use of Richman Investment’s resources. Damages include the loss of sensitive or company confidential data

Unit 8 Assignment 1 Video Summary 6

836 words - 4 pages Unit 8 Assignment 1 Video Summary 6 VIDEO #3.01 Topics: * Microsoft Operating Systems * Other Operating Systems Terms: * DOS – Disk Operating System is an acronym for several closely related operating systems that dominated the IBM PC compatible market between 1981 and 1995 * UNIX - is a family of multitasking, multiuser computer operating systems that derive from the original AT&T UNIX. * Command Line Interface

Unit 3 Assignment 1: Fourth Amendment

929 words - 4 pages Unit 3 Assignment 1: Fourth Amendment IS3350 The United States Constitution affords all people certain rights. The Fifth Amendment states that we have the right against self-incrimination. The Fourth Amendment protects us from unreasonable search or seizure. People have the right to confront witnesses and accusers. Nothing can change these rights unless the U.S. constitutions was rewritten and that is not likely to happen. This paper will be

Unit 3 Assignment 1 Networking Models Review

613 words - 3 pages Networking Models Review (Unit 3) 1. Which of the following is true about a TCP/IP network? B 2. Which of the following terms is not a common synonym for TCP/IP model? (Choose two answers.) C & D 3. Think generically about the idea of a networking standard, ignoring any particular standard or standards group. Which of the following is typically true of a standard? (Choose two answers.) A & C 4. Contrast an international

Unit 6. Assignment 1. Ad User/Group Design Scenario

519 words - 3 pages Unit 6. Assignment 1. AD User/Group Design Scenario Course Objectives and Learning Outcomes In this assignment, you will recommend a strategy for creating groups. Assignment Requirments Review the following scenario: A junior IT administrator has been tasked with creation groups for a new formed division/s. From: Junior Admin To: IT Admin Subject: Print and Security Issues. I need to provide access to resources thoughout our AD

Unit 7 Assignment 1: Risk Management in a Business Model

4054 words - 17 pages Unit 7 Assignment 1: Risk Management in a Business Model Risk Management in a Business Model Declaration This report entitled the overview of understand the risk management functions in business, understand how business risk is assessed and managed, understand the effects of business risks and how they can be managed and understand approaches to crisis management and business continuity planning. The aim of this assignment is to raise

Communication Unit 2 Assignment 1 Comparison of Historical Communication Pices

555 words - 3 pages Unit 2 Assignment 1 Comparison of Historical Communication Pices During the 1700s elocution was considered an art form, and a formal discipline. Elocution encompasses a number of important principles, articulation, inflection, accent, voice, and gesture. The study of this topic seems to me, to be very important. Humans in general need to convey the meaning behind their message. Without this course of study and its effects on our modern world

Related Papers

Unit 4 Assignment 1 P1 M1 D

1370 words - 6 pages Leah Dade Unit 4- Business Communications assignment (P1 M1 D1) Business information is used to pass on important information to people inside or outside the company. Marks and Spencer’s have used business information a lot in their company within the 130 years of existents. In M&S verbal information is used, which is where two or more people communicate face to face in either a formal or in-formal manure. Verbal Communication Verbal

Unit 4 Assignment 4

680 words - 3 pages Unit 4 Assignment 4 Non- electronic communication involves the distribution of a message usually in the form of: Reports, Letters, Flow Charts, Invoices and even Verbal Communication amongst employees. This form of communicating is not as popular as it once was, but it provides businesses with other avenues to communicate instead of electronic communication. Furthermore, different types of communication suit contrasting businesses in addition

Ls308 Unit 4 Assignment

1215 words - 5 pages LS308 -Unit 4: - Assignment Nyree Griffith Kaplan University – July 23, 2013 According to anthropologists Lauren Nader and Harry F. Todd, disputes are described as “a problem that escalates beyond an initial disagreement” (Steven Barkan, Law and Society: An Introduction, 2009). There are three stages to the dispute process that Nader and Todd talk about. The first stage is called grievance, the second conflict, and the final dispute

Unit 1 Assignment 1

739 words - 3 pages Unit 1 Assignment 1 Exploring Programming Languages PT1420 Introduction to Programming Pong Sintaisong ITT-Tech Tempe Campus Instructor: Ms. Kate Eskesen 9/23/2015 5 Programming Languages 1970s-2000 1970s Pascal: Niklaus Wirth was is the invertor and was invented in 1971 Motivation: To provide features that were lacking in other languages at the time. Forth: Forth was created in 1970 by Charles H. Moore Motivation: He wanted to