Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Forensics is usually the more interesting of the topics for these two chapters. Take the following scenario and map out the chain of custody (the

Forensics is usually the more interesting of the topics for these two chapters. Take the following scenario and map out the chain of custody (the book describes the steps) that needs to be followed if you are going to preserve the integrity of the evidence.

Scenario: A co-worker is suspected of surfing the Internet on their work machine and downloading pornographic material and printing some of it on the department printer during the evening hours when most people have gone home. You are responsible to collect data to support the worker's dismissal.

1. Describe the data you need to obtain, the methods you would use to get it, and the chain of custody of the data once collected.

2. Don't just list the steps the book provides for the chain of custody! Explain in detail where/how/who will hold the evidence at which step and why it is important to follow each step.

3. What could happen to the data at each step if the chain of custody is not followed?

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Datacasting How To Stream Databases Over The Internet

Authors: Jessica Keyes

1st Edition

007034678X, 978-0070346789

More Books

Students also viewed these Databases questions

Question

How many Tables Will Base HCMSs typically have? Why?

Answered: 1 week ago

Question

What is the process of normalization?

Answered: 1 week ago