- 4
- 0
- 约1.42万字
- 约 16页
- 2018-03-31 发布于河南
- 举报
Chapter 2 Understanding Computer Investigation.pdf
Guide to Computer Guide to Computer Forensics and Forensics and Investigations, Investigations, Second Edition Second Edition Chapter 2 Understanding Computer Investigation Objectives Objectives
? Prepare a case
? Begin an investigation
? Understand computer forensics workstations and software
? Conduct an investigation
? Complete a case
? Critique a case Guide to Computer Forensics and Investigations, 2e 2 Preparing a Computer Investigation Preparing a Computer Investigation
? Role of computer forensics professional: gather evidence to prove a suspect committed a crime or violated a company policy
? Collect evidence that can be offered in court or at a corporate inquiry – Investigate the suspect’s computer – Preserve the evidence on a different computer Guide to Computer Forensics and Investigations, 2e 3 1 Preparing a Computer Investigation Preparing a Computer Investigation continued continued ? Follow an accepted procedure to prepare a case
? Chain of custody – Route the evidence takes from the time you find it until the case is closed or goes to court
? US DOJ Search and Seizure Guide /criminal/cybercrime/ssmanu al2002.pdf Guide to Computer Forensics and Investigations, 2e 4 Examining a Computer Crime Examining a Computer Crime
? Computers can contain information that helps law enforcement determine: – Chain of events leading to a crime – Evidence that can lead to a conviction
? Law enforcement officers should follow proper procedure when acquiring the evidence – Digital evidence can be easily altered by an overeager investigator Guide to Computer Forensics and Investigations, 2e 5 Examining a Computer Crime Examining a Computer Crime continued continued Guide to Computer Forensics and Investigations, 2e 6 2
Examining a Company Policy Violation Examining a Company Policy Violation
? Employees misusing resources can cost companies millions of dollars
? Misuse includes: – Surfing the Internet – Sending personal e-mails – Using company compu
您可能关注的文档
- Assessing the self-heating behaviour of Callide coal using a 2-m.pdf
- ASTOS-PEET-ICD-001_Iss1.4_PEET_Interface_Control_Document.pdf
- Atmospheric pressure chemical vapour deposition of VO2 and.pdf
- Atomic Layer Deposition for the Conformal Coating ofNanoporous Materials.pdf
- ATU397-global supply chain Rev2.docx
- Au-TiO2-Au as a Plasmonic Coupling Photocatalyst--jp212303q.pdf
- Aus.Energy_5_Coal澳大利亚的煤炭资源.pdf
- Automata CommunicationAmongst Automata_Foerster1962.pdf
- Automatic spacecraft docking using computer vision-based guidance and control techniques.pdf
- automotive engine speed control A robust nonlinear control framework.pdf
原创力文档

文档评论(0)