.

Wednesday, February 5, 2014

Forensics

A 14- year old girl is missing afterward having an argument with her p bents. They c each the police at midnight on whitethorn 28. A police researcher shows up inwardly 30 minutes to interview them and finds out that the girl dog-tired a lot of time on the internet. The parents agree to permit the investigator slang her laptop. What steps should be taken succeeding(prenominal)? * I would acquire the parents to look at her history on the computing machine to see if they take on move gain any in pulpation, finished chat logs and control a list of all(a) her friends that they crawl in or dont know. * Then I would have a change of custody form signed by the parents authorizing me to take the computing device and investigate the contents using the approiate software. * I would log in all items taken and seal all access points with tape signed by me. The estimator would be localized in a safe environment for the data processor to protect the evidence an d the property. * The computer would be turned incessantlyywhere to the computer forensics lab by change of custody form to be invetigated for evidence that may lead to a place where the tender female would go. * I I would then grammatical slip-up up a search warrant for her cell name records while I was waiting on the forensics of the computer. * After forensics came backrest end I would do the appropriate measures manage tour contacts or where ever the information leads me to go. Case Project 2-4: You are the computer forensic investigator for a law hard. The firm acquired a new client, a young woman who was dismissed from her duty for inappropriate files discovered on her computer, and she swears she never accessed the files. What questions should you ask and how should you run? 1. Was your system discussion protected? 2. Did anyone else know your password? 3. Where was you when these events occurred? 4. fall in you ever b een convicted of this type of behavior forr! ader? 5. Have you ever stepped away from your desk with your computer unlocked like a journey to the bathroom or out to lunch. 6....If you deficiency to get a full essay, order it on our website: OrderCustomPaper.com

If you want to get a full essay, visit our page: write my paper

No comments:

Post a Comment