ITF412 GP3 Dionne Jordan1

ITF412 GP3 Dionne Jordan1 - Crimes and Computer Forensics 1...

Info iconThis preview shows pages 1–5. Sign up to view the full content.

View Full Document Right Arrow Icon
Crimes and Computer Forensics 1 Ensuring your Protection Dionne Jordan 6-27-2010 American InterContinental University
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Crimes and Computer Forensics 2 Abstract This is an overview of the procedures our team reported to ensure that there was protection against unreasonable search and seizure and protection against self incrimination, search warrants were obtain. We will give you the rules and laws for seizure of evidence, Forensics technology and laws, Constitutional Amendments related to forensics and the Federal rules of evidence affecting forensic investigations.
Background image of page 2
Crimes and Computer Forensics 3 Ensuring your Protection As a forensic investigator, planning and analysis are required to determine what digital media will be seized, what type of information, and how the investigation will be conducted. In a large scale case it is important that we provide technicians with the appropriate amount of data supplemented with keyword lists; too little or too much data can make the forensic investigation very difficult. Our agency have distinct roles for investigating, we execute warrants and subpoenas before performing any task, we interview people that are involved in every case, we conduct preliminary forensic tests and populate every case file. Our forensic investigators forensically use sound examination tools, image media, analyzes evidence, tag evidence and report the results. Our investigator refines the goals and scope if every examination, but in a large scale case such activity of filtering voluminous case can be critical: too few case information or detail can make the task impossible and too much detail can be overwhelming, that why the best practice is to plan a digital examination and establish planning concepts (Bogen, Dumpier, 2005). For example say that we were call to examine 40 workstation, and imaging them, with a few servers if a white collar crime was committed, it would be difficult to characterize the evidence and outline the goals and scope of the examination. That’s way we propose a case domain modeling methodology form software engineering requirement analysis, serving as a structure analytical technique for representing and deriving relevant computer case information. We make sure to have the state of the art equipment to guarantee the quality of our work. Every investigator has distinct roles, they execute subpoenas, warrants, conduct preliminary forensic test, and populate the case files.
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Crimes and Computer Forensics 4 They tag evidence, using forensically sound examination tools, report results analyzes evidence,, and image media. Digital encryption techniques are used today to protect data, to prove integrity and maintain privacy. To a forensic analyst they are vital concerns. In order to analyze and
Background image of page 4
Image of page 5
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 01/06/2011 for the course IT ITF401 taught by Professor Mr during the Spring '10 term at AIU Online.

Page1 / 9

ITF412 GP3 Dionne Jordan1 - Crimes and Computer Forensics 1...

This preview shows document pages 1 - 5. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online