Investigative Collection of Evidence

No directly quoted material may be used in this project paper. Resources should be summarized or paraphrased with appropriate in-text and Resource page. For the purpose of this Project, you are the Data Security Analyst for Allied Technology Systems. In this portion of the investigation, you are ONLY collecting the physical evidence, documenting and reporting. You will NOT be handling the digital data during this stage of the investigation. You should limit your “care and handling” of each piece of evidence to the physical handling of the digital item/container. Part I: Overview/Case Summary 1. Write a short summary of the incident that has occurred and establish what permissions/authorities you have before you search Mr. Jackson’s former Company work area. Part II: Physical Evidence Acquisition: 2. Look at the photo of Mr. Jackson’s work area. (See file attachment Work_Area.jpg) Identify three (3) potential items of digital evidence you see in the photo. • For EACH item of digital evidence you identified, describe the steps that would be taken to collect the items (with emphasis on the care and handling of each item consistent with digital forensic best practices described in the module content/weekly readings) at the scene. You should document these steps in a detailed way that will mitigate questions, concerns, or a basic lack of information that will call your processes into question in court. • Also for EACH item you identified, explain what potential use the item would be within the investigation (e.g., what type of data that item might hold, and what kind of evidence represents for prosecution.) 3. Look at the photo of Mr. Jackson’s work area. (See file attachment Work_Area.jpg) Identify three (3) potential items of non-digital evidence you see in the photo. • For EACH item of non-digital evidence you identified, describe the steps that would be taken to collect the items (with emphasis on the care and handling of each item consistent with digital forensic best practices described in the module content/weekly readings) at the scene. You should document these steps in a detailed way that will mitigate questions, concerns, or a basic lack of information that will call your processes into question in court. • Also for EACH item you identified, explain what potential use the item would be within the investigation (e.g., what type of data that item might hold, and what kind of evidence represents for prosecution.) 4. Detail in your report how your seized evidence from Questions two (2) and three (3) are secured and stored after removing it from the original scene (the work area) and prior to sending it for analysis. Describe the security procedures in place as well as any environmental protections (specific to computer/digital devices) that are in place within the storage area.

#Investigative #Collection #Evidence

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

Microbe Myth Buster Topics Use the list below to select

Microbe Myth Buster Topics Use the list below to select your myth buster topic. Once your topic is selected, conduct research on the subject to debunk the myth surrounding the topic. Make sure to follow the guidelines in the Microbe Myth Buster Project document and in the grading rubric.

This part of the Conscious Capitalism simulation assignment is individual.

This part of the Conscious Capitalism simulation assignment is individual. You will work with your team members and determine an appropriate digital marketing plan to include in your Benchmark – Digital Business Plan assignment. In Topic 5, your team developed a business plan (global marketing) to support your marketing division

1. Identify and describe four ways in which the privacy

1. Identify and describe four ways in which the privacy threats posed by cybertechnology differ from those posed by earlier technologies? 2. Can a person claim privacy rights when they use social networking sites such as Facebook and Twitter? Why is this difficult to define?  Can there be such a

Isabella is expecting her first baby and is very concerned

  Isabella is expecting her first baby and is very concerned about eating well during her pregnancy. She is eating more fruits, vegetables, and whole grains than she used to and has started to drink skim milk. She is also eating fish two or three times a week. She still

Read National Council of State Boards of Nursing. Nursing Pathways

  Read National Council of State Boards of Nursing. Nursing Pathways for Patient Safety 1st ed. St. Louis: MO: Elsevier Saunders. 9780323065177. · Chapter 1 Pages 1-29  Research the Institute of Medicine Competencies http://qsen.org/competencydomains/teamwork-and-collaboration/  Select and discuss one of  the 5 QSEN(Quality and Safety Education for Nurses  competencies;)    Rubric:  

Prior to beginning work on this discussion, watch Inside USA

Prior to beginning work on this discussion, watch Inside USA – Rise of hate, Part 1 (Links to an external site.) and read Number of U.S. Hate Groups is Rising, Report Says (Links to an external site.). Were you aware of the number and range of recognized hate groups in these states?

Overview In this assignment, you will evaluate a current organizational

  Overview In this assignment, you will evaluate a current organizational structure and recommend structural changes that can help address the concerns the organization identified regarding collaboration, communication, and autonomy. Scenario You work for an organization that has traditionally been very formalized, and managers have had a very broad span

Compose a single body descriptive paragraph in formal written English.

  Compose a single body descriptive paragraph in formal written English. Be sure to include the following: Topic sentence that provides the main idea for the descriptive paragraph. Body sentences that discuss the main idea for the descriptive paragraph using explanation, examples, details, and of course, descriptive elements. Transition sentence: Your descriptive

Part 3: Performance Appraisals In leading people, it is critical

Part 3: Performance Appraisals In leading people, it is critical to be able to provide meaningful feedback in the performance review process. Nearly all companies have an annual review process. In this activity, you will practice written performance feedback. Your performance appraisal should Assess employee performance of two characters from

US History, 1492 to 1877

 Description Instructions: Find a Primary Source (first-hand, original work) from U.S. History, 1492 to 1877, from the internet or book of primary sources. A book written by U.S. Grant himself is a Primary Source. A book written by someone else on the life of U.S. Grant is a Secondary Source.

Bronfenbrenner TV family

 you have to watch the TV family show or read the book and then answer the questions : 1- The name of Tv show or book , you choose by your own idea 2- Choose a child in that family to evaluate 3- Create Bromfenbrenner’s system for the child selected(Individual,

Please review chapter #13 from the textbook What are people

 Please review chapter #13 from the textbook What are people currently doing to achieve security objectives? Where do those security objectives originate? Who are the people who are engaged in security and what are their reasons for engagement?  Answer the question with a short paragraph, with a minimum of 250