ITF412_IP4.Dionne Jordandocx

ITF412_IP4.Dionne Jordandocx - Computer Crimes and Computer...

Info iconThis preview shows pages 1–4. Sign up to view the full content.

View Full Document Right Arrow Icon
Computer Crimes and Computer Forensics 1 Prior Planning for an Investigation Prior Planning for an Investigation Dionne Jordan 7-1-2010 American InterContinental University
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Computer Crimes and Computer Forensics 2 Abstract This is a prior planning of ideas concerning the procedures to investigate Windows computers. We will plan the process by which we must perform investigation of the directory structure, Registry, Internet usage, and perform file system and log file analysis. Finally we will identify the purpose of all Window based forensic investigation before closing.
Background image of page 2
Computer Crimes and Computer Forensics 3 Prior Planning for an Investigation Computer crime is an artifact in this present time’s wired and global society. It no wonder anyone involved in criminal and or deviant behavior have received technology as a way for improving or extending criminal tradecraft. The time has passed for using document as a base for evidence, today electronic or digital is used for evidence. There are many investigative models design to assist law enforcement to digital based evidence (Rogers, Mislan, Goldman, Wedge, Debrota, 2006). In a computer forensic investigation, transferring of the system, data found on the storage or a forensic copy is extremely time consuming considering the volume of date examined. A forensically sound principle and sensitive to time constraints model meets the demand for timely information derived from digital sources (cited in Rogers et al., 2006). There are two main areas to consider, technical operation and legal. The legal part, deals with the warrants or order and the scope. Does the warrant include seizure and removal of the system? Does the 4 th Amendment need addressing? Does the warrant permit onsite or insight examination? These are the legal issue that needs to be sorted out. Technical or operation deals with the type of case like: Is the time factor critical? Is the scene safe and controlled effectively? These issues are also to be sorted out. That’s why it’s important to our team to make sure we minimize contamination of the evidence and original scene by maintaining the integrity of the digital evidence, chain of custody, comply with the
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 4
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 01/06/2011 for the course IT ITF401 taught by Professor Mr during the Spring '10 term at AIU Online.

Page1 / 7

ITF412_IP4.Dionne Jordandocx - Computer Crimes and Computer...

This preview shows document pages 1 - 4. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online