Project 2 identifying and collecting digital evidence

This preview shows page 8 - 9 out of 9 pages.

PROJECT 2 – IDENTIFYING AND COLLECTING DIGITAL EVIDENCE 8 References Amazon. (2013). PNY Turbo 64GB USB 3.0 Flash Drive . Retrieved from Amazon: International Association for Property and Evidence. (2015, March 8). Professional Standards, v.2.5.1 . Retrieved from IAPE: %202.5.1%20Approved%20Clean.pdf Microsoft. (2015). What is a BitLocker Drive Encryption Key or PIN? Retrieved from Microsoft: - startup-key-or-pin Privacy at Work: What Are Your Rights? (2015). Retrieved from FindLaw: - rights.html Searches at Work - Legal Issues to Consider . (n.d.). Retrieved from Texas Workforce Commission: Soloman, M. G., Rudolph, K., Tittel, E., Broom, N., & Barrett, D. (2011). Computer Forensics JumpStart, Second Edition. Retrieved from U.S. Department of Justice. (2008). Electronic Crime Scene Investigation: A Guide for First Responders, Second Edition. Retrieved from National Criminal Justice Reference Service:
PROJECT 2 – IDENTIFYING AND COLLECTING DIGITAL EVIDENCE 9 U.S. Dept of Homeland Security, U.S. Secret Service. (2007). Best Practices for Seizing Electronic Evidence v.3. Retrieved from Foward Edge II:

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture