SlideShare a Scribd company logo
1 of 2
Steps to Secure Digital Evidence
Write a detailed report of four to five pages in length explaining
these steps and procedures.
Identify a specific type of cybercrime and provide answers to
the subsequent questions using the crime you selected.
You will identify the likely digital items that need to be
collected and then properly secure them.
(The digital items can be thumb drives, CDs, cell phones, small,
older hand-held game system play stations, Sony game systems,
paper with passwords on them hidden under a mouse pad and in
a desk, butterfly, etc.)
You will document the steps taken to properly secure digital
evidence that you have chosen to take into custody.
Describe what “triage” of digital evidence means regarding
cyber investigations.
Explain chain of custody and how to secure and preserve digital
evidence.
Finally, you must ensure that the steps to secure evidence are
completed, including identifying how the items will then be
transported to the evidence technician’s station/office.
As you answer the questions above, make sure you consider
The importance of demonstrating that a forensic process was
followed to a criminal or civil case. Address the impact on the
case of using tools that are not vetted by the community.
How you will use Write blockers to protect against
inadvertently tainting evidence. Provide a discussion of the
different ways that these can be implemented and an example of
a specific vendor technology.
Discuss how a hashing algorithm is used in a forensic
investigation to prove evidence integrity and discuss how using
a tool shown to cause collisions could be detrimental to the
case. Provide an example of an algorithm used to authenticate
the data.
Use the American Psychological Association (APA) style (6th
edition) to write your assignment. Remember to use quality
references to support the ideas in your paper.
Compose your work in a .doc or .docx file type using a word
processor (such as Microsoft Word, etc.) and save it frequently
to your computer.

More Related Content

Similar to Steps to Secure Digital EvidenceWrite a detailed report of f.docx

i need this paper written 2.docx
i need this paper written 2.docxi need this paper written 2.docx
i need this paper written 2.docxwrite4
 
FINAL PROJECT - Investigative Conclusion and TestimonyNo d.docx
FINAL PROJECT - Investigative Conclusion and TestimonyNo d.docxFINAL PROJECT - Investigative Conclusion and TestimonyNo d.docx
FINAL PROJECT - Investigative Conclusion and TestimonyNo d.docxtjane3
 
What is Digital Forensics.docx
What is Digital Forensics.docxWhat is Digital Forensics.docx
What is Digital Forensics.docxAliAshraf68199
 
1 IT 140 A Mini History of Text-Based Games Text
1  IT 140 A Mini History of Text-Based Games  Text1  IT 140 A Mini History of Text-Based Games  Text
1 IT 140 A Mini History of Text-Based Games TextMartineMccracken314
 
1 IT 140 A Mini History of Text-Based Games Text
1  IT 140 A Mini History of Text-Based Games  Text1  IT 140 A Mini History of Text-Based Games  Text
1 IT 140 A Mini History of Text-Based Games TextSilvaGraf83
 
03.fnc corporate protect workshop new
03.fnc corporate protect workshop new03.fnc corporate protect workshop new
03.fnc corporate protect workshop newforensicsnation
 
FNC Corporate Protect Workshop
FNC Corporate Protect WorkshopFNC Corporate Protect Workshop
FNC Corporate Protect Workshopforensicsnation
 
Malware analysis
Malware analysisMalware analysis
Malware analysisAnne ndolo
 
Computer forensics toolkit
Computer forensics toolkitComputer forensics toolkit
Computer forensics toolkitMilap Oza
 
Network and computer forensics
Network and computer forensicsNetwork and computer forensics
Network and computer forensicsJohnson Ubah
 
Digital Forensics for Artificial Intelligence (AI ) Systems.pdf
Digital Forensics for Artificial Intelligence (AI ) Systems.pdfDigital Forensics for Artificial Intelligence (AI ) Systems.pdf
Digital Forensics for Artificial Intelligence (AI ) Systems.pdfMahdi_Fahmideh
 
WEEK 3 ESSAY QUESTIONS Instructions Answer all questions .docx
WEEK 3 ESSAY QUESTIONS Instructions Answer all questions .docxWEEK 3 ESSAY QUESTIONS Instructions Answer all questions .docx
WEEK 3 ESSAY QUESTIONS Instructions Answer all questions .docxcockekeshia
 
Digital forensics Steps
Digital forensics StepsDigital forensics Steps
Digital forensics Stepsgamemaker762
 
Security Training 2008
Security Training 2008Security Training 2008
Security Training 2008bdill
 

Similar to Steps to Secure Digital EvidenceWrite a detailed report of f.docx (20)

i need this paper written 2.docx
i need this paper written 2.docxi need this paper written 2.docx
i need this paper written 2.docx
 
FINAL PROJECT - Investigative Conclusion and TestimonyNo d.docx
FINAL PROJECT - Investigative Conclusion and TestimonyNo d.docxFINAL PROJECT - Investigative Conclusion and TestimonyNo d.docx
FINAL PROJECT - Investigative Conclusion and TestimonyNo d.docx
 
Computer forencis
Computer forencisComputer forencis
Computer forencis
 
What is Digital Forensics.docx
What is Digital Forensics.docxWhat is Digital Forensics.docx
What is Digital Forensics.docx
 
1 IT 140 A Mini History of Text-Based Games Text
1  IT 140 A Mini History of Text-Based Games  Text1  IT 140 A Mini History of Text-Based Games  Text
1 IT 140 A Mini History of Text-Based Games Text
 
1 IT 140 A Mini History of Text-Based Games Text
1  IT 140 A Mini History of Text-Based Games  Text1  IT 140 A Mini History of Text-Based Games  Text
1 IT 140 A Mini History of Text-Based Games Text
 
03.fnc corporate protect workshop new
03.fnc corporate protect workshop new03.fnc corporate protect workshop new
03.fnc corporate protect workshop new
 
FNC Corporate Protect
FNC Corporate ProtectFNC Corporate Protect
FNC Corporate Protect
 
FNC Corporate Protect Workshop
FNC Corporate Protect WorkshopFNC Corporate Protect Workshop
FNC Corporate Protect Workshop
 
Malware analysis
Malware analysisMalware analysis
Malware analysis
 
N.sai kiran IIITA AP
N.sai kiran IIITA APN.sai kiran IIITA AP
N.sai kiran IIITA AP
 
Computer forensics toolkit
Computer forensics toolkitComputer forensics toolkit
Computer forensics toolkit
 
Regan, Keller, SF State Securing the vendor mr&ak
Regan, Keller, SF State Securing the vendor mr&akRegan, Keller, SF State Securing the vendor mr&ak
Regan, Keller, SF State Securing the vendor mr&ak
 
Network and computer forensics
Network and computer forensicsNetwork and computer forensics
Network and computer forensics
 
Digital Forensics for Artificial Intelligence (AI ) Systems.pdf
Digital Forensics for Artificial Intelligence (AI ) Systems.pdfDigital Forensics for Artificial Intelligence (AI ) Systems.pdf
Digital Forensics for Artificial Intelligence (AI ) Systems.pdf
 
WEEK 3 ESSAY QUESTIONS Instructions Answer all questions .docx
WEEK 3 ESSAY QUESTIONS Instructions Answer all questions .docxWEEK 3 ESSAY QUESTIONS Instructions Answer all questions .docx
WEEK 3 ESSAY QUESTIONS Instructions Answer all questions .docx
 
Digital forensics Steps
Digital forensics StepsDigital forensics Steps
Digital forensics Steps
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Computer Forensics.pptx
Computer Forensics.pptxComputer Forensics.pptx
Computer Forensics.pptx
 
Security Training 2008
Security Training 2008Security Training 2008
Security Training 2008
 

More from rjoseph5

Steps Begin your board with an explanation of your topic and th.docx
Steps Begin your board with an explanation of your topic and th.docxSteps Begin your board with an explanation of your topic and th.docx
Steps Begin your board with an explanation of your topic and th.docxrjoseph5
 
Steps for Effective Case Analysis Adapted from Harvard .docx
Steps for Effective Case Analysis  Adapted from Harvard .docxSteps for Effective Case Analysis  Adapted from Harvard .docx
Steps for Effective Case Analysis Adapted from Harvard .docxrjoseph5
 
Steps of Assignment• Choose TWO of the social health determi.docx
Steps of Assignment• Choose TWO of the social health determi.docxSteps of Assignment• Choose TWO of the social health determi.docx
Steps of Assignment• Choose TWO of the social health determi.docxrjoseph5
 
Stephen Pevar, Chapter 16 Indian Gaming” (from textbook).docx
Stephen Pevar, Chapter 16 Indian Gaming” (from textbook).docxStephen Pevar, Chapter 16 Indian Gaming” (from textbook).docx
Stephen Pevar, Chapter 16 Indian Gaming” (from textbook).docxrjoseph5
 
Step 2 in your textbook outlines a few specific ways to seek out pot.docx
Step 2 in your textbook outlines a few specific ways to seek out pot.docxStep 2 in your textbook outlines a few specific ways to seek out pot.docx
Step 2 in your textbook outlines a few specific ways to seek out pot.docxrjoseph5
 
STEPPING INTO MANAGEMENT.Questions 1 to 20 Select the bes.docx
STEPPING INTO MANAGEMENT.Questions 1 to 20 Select the bes.docxSTEPPING INTO MANAGEMENT.Questions 1 to 20 Select the bes.docx
STEPPING INTO MANAGEMENT.Questions 1 to 20 Select the bes.docxrjoseph5
 
Stephen and Meredith have a 4-yr old son named Will. They are expect.docx
Stephen and Meredith have a 4-yr old son named Will. They are expect.docxStephen and Meredith have a 4-yr old son named Will. They are expect.docx
Stephen and Meredith have a 4-yr old son named Will. They are expect.docxrjoseph5
 
Step 1 Write five sentences with spelling errors.Make sure t.docx
Step 1 Write five sentences with spelling errors.Make sure t.docxStep 1 Write five sentences with spelling errors.Make sure t.docx
Step 1 Write five sentences with spelling errors.Make sure t.docxrjoseph5
 
Stephen Pevar, Chapter 8 Criminal Jurisdiction in Indian Country.docx
Stephen Pevar, Chapter 8 Criminal Jurisdiction in Indian Country.docxStephen Pevar, Chapter 8 Criminal Jurisdiction in Indian Country.docx
Stephen Pevar, Chapter 8 Criminal Jurisdiction in Indian Country.docxrjoseph5
 
Stephanie WroteA lean organization understands customer value a.docx
Stephanie WroteA lean organization understands customer value a.docxStephanie WroteA lean organization understands customer value a.docx
Stephanie WroteA lean organization understands customer value a.docxrjoseph5
 
Step 1 Do some research on the Affordable Care Act.  You can start.docx
Step 1 Do some research on the Affordable Care Act.  You can start.docxStep 1 Do some research on the Affordable Care Act.  You can start.docx
Step 1 Do some research on the Affordable Care Act.  You can start.docxrjoseph5
 
Step 3 Construct Ethical ArgumentsDetermine which of the ethi.docx
Step 3 Construct Ethical ArgumentsDetermine which of the ethi.docxStep 3 Construct Ethical ArgumentsDetermine which of the ethi.docx
Step 3 Construct Ethical ArgumentsDetermine which of the ethi.docxrjoseph5
 
Step 2 Organization ProfileCreate a one-page ‘Organization Prof.docx
Step 2 Organization ProfileCreate a one-page ‘Organization Prof.docxStep 2 Organization ProfileCreate a one-page ‘Organization Prof.docx
Step 2 Organization ProfileCreate a one-page ‘Organization Prof.docxrjoseph5
 
Step 2 Grading Rubric EconomyTask descriptionComponents of .docx
Step 2 Grading Rubric EconomyTask descriptionComponents of .docxStep 2 Grading Rubric EconomyTask descriptionComponents of .docx
Step 2 Grading Rubric EconomyTask descriptionComponents of .docxrjoseph5
 
Step 2 Attend Meeting with ACME· Read the ACME meeting documen.docx
Step 2 Attend Meeting with ACME·  Read the ACME meeting documen.docxStep 2 Attend Meeting with ACME·  Read the ACME meeting documen.docx
Step 2 Attend Meeting with ACME· Read the ACME meeting documen.docxrjoseph5
 
Step 1 Put the following steps in the order of a routine patient .docx
Step 1 Put the following steps in the order of a routine patient .docxStep 1 Put the following steps in the order of a routine patient .docx
Step 1 Put the following steps in the order of a routine patient .docxrjoseph5
 
Step 1  To annotate a source, first cite the source in correct .docx
Step 1  To annotate a source, first cite the source in correct .docxStep 1  To annotate a source, first cite the source in correct .docx
Step 1  To annotate a source, first cite the source in correct .docxrjoseph5
 
Step 1Read the first two sections of Wordsworths Tintern.docx
Step 1Read the first two sections of Wordsworths Tintern.docxStep 1Read the first two sections of Wordsworths Tintern.docx
Step 1Read the first two sections of Wordsworths Tintern.docxrjoseph5
 
Step 1The first step in performing an IT audit that is tied to b.docx
Step 1The first step in performing an IT audit that is tied to b.docxStep 1The first step in performing an IT audit that is tied to b.docx
Step 1The first step in performing an IT audit that is tied to b.docxrjoseph5
 
Step 1Select ONE of the following fugal agents for your assignme.docx
Step 1Select ONE of the following fugal agents for your assignme.docxStep 1Select ONE of the following fugal agents for your assignme.docx
Step 1Select ONE of the following fugal agents for your assignme.docxrjoseph5
 

More from rjoseph5 (20)

Steps Begin your board with an explanation of your topic and th.docx
Steps Begin your board with an explanation of your topic and th.docxSteps Begin your board with an explanation of your topic and th.docx
Steps Begin your board with an explanation of your topic and th.docx
 
Steps for Effective Case Analysis Adapted from Harvard .docx
Steps for Effective Case Analysis  Adapted from Harvard .docxSteps for Effective Case Analysis  Adapted from Harvard .docx
Steps for Effective Case Analysis Adapted from Harvard .docx
 
Steps of Assignment• Choose TWO of the social health determi.docx
Steps of Assignment• Choose TWO of the social health determi.docxSteps of Assignment• Choose TWO of the social health determi.docx
Steps of Assignment• Choose TWO of the social health determi.docx
 
Stephen Pevar, Chapter 16 Indian Gaming” (from textbook).docx
Stephen Pevar, Chapter 16 Indian Gaming” (from textbook).docxStephen Pevar, Chapter 16 Indian Gaming” (from textbook).docx
Stephen Pevar, Chapter 16 Indian Gaming” (from textbook).docx
 
Step 2 in your textbook outlines a few specific ways to seek out pot.docx
Step 2 in your textbook outlines a few specific ways to seek out pot.docxStep 2 in your textbook outlines a few specific ways to seek out pot.docx
Step 2 in your textbook outlines a few specific ways to seek out pot.docx
 
STEPPING INTO MANAGEMENT.Questions 1 to 20 Select the bes.docx
STEPPING INTO MANAGEMENT.Questions 1 to 20 Select the bes.docxSTEPPING INTO MANAGEMENT.Questions 1 to 20 Select the bes.docx
STEPPING INTO MANAGEMENT.Questions 1 to 20 Select the bes.docx
 
Stephen and Meredith have a 4-yr old son named Will. They are expect.docx
Stephen and Meredith have a 4-yr old son named Will. They are expect.docxStephen and Meredith have a 4-yr old son named Will. They are expect.docx
Stephen and Meredith have a 4-yr old son named Will. They are expect.docx
 
Step 1 Write five sentences with spelling errors.Make sure t.docx
Step 1 Write five sentences with spelling errors.Make sure t.docxStep 1 Write five sentences with spelling errors.Make sure t.docx
Step 1 Write five sentences with spelling errors.Make sure t.docx
 
Stephen Pevar, Chapter 8 Criminal Jurisdiction in Indian Country.docx
Stephen Pevar, Chapter 8 Criminal Jurisdiction in Indian Country.docxStephen Pevar, Chapter 8 Criminal Jurisdiction in Indian Country.docx
Stephen Pevar, Chapter 8 Criminal Jurisdiction in Indian Country.docx
 
Stephanie WroteA lean organization understands customer value a.docx
Stephanie WroteA lean organization understands customer value a.docxStephanie WroteA lean organization understands customer value a.docx
Stephanie WroteA lean organization understands customer value a.docx
 
Step 1 Do some research on the Affordable Care Act.  You can start.docx
Step 1 Do some research on the Affordable Care Act.  You can start.docxStep 1 Do some research on the Affordable Care Act.  You can start.docx
Step 1 Do some research on the Affordable Care Act.  You can start.docx
 
Step 3 Construct Ethical ArgumentsDetermine which of the ethi.docx
Step 3 Construct Ethical ArgumentsDetermine which of the ethi.docxStep 3 Construct Ethical ArgumentsDetermine which of the ethi.docx
Step 3 Construct Ethical ArgumentsDetermine which of the ethi.docx
 
Step 2 Organization ProfileCreate a one-page ‘Organization Prof.docx
Step 2 Organization ProfileCreate a one-page ‘Organization Prof.docxStep 2 Organization ProfileCreate a one-page ‘Organization Prof.docx
Step 2 Organization ProfileCreate a one-page ‘Organization Prof.docx
 
Step 2 Grading Rubric EconomyTask descriptionComponents of .docx
Step 2 Grading Rubric EconomyTask descriptionComponents of .docxStep 2 Grading Rubric EconomyTask descriptionComponents of .docx
Step 2 Grading Rubric EconomyTask descriptionComponents of .docx
 
Step 2 Attend Meeting with ACME· Read the ACME meeting documen.docx
Step 2 Attend Meeting with ACME·  Read the ACME meeting documen.docxStep 2 Attend Meeting with ACME·  Read the ACME meeting documen.docx
Step 2 Attend Meeting with ACME· Read the ACME meeting documen.docx
 
Step 1 Put the following steps in the order of a routine patient .docx
Step 1 Put the following steps in the order of a routine patient .docxStep 1 Put the following steps in the order of a routine patient .docx
Step 1 Put the following steps in the order of a routine patient .docx
 
Step 1  To annotate a source, first cite the source in correct .docx
Step 1  To annotate a source, first cite the source in correct .docxStep 1  To annotate a source, first cite the source in correct .docx
Step 1  To annotate a source, first cite the source in correct .docx
 
Step 1Read the first two sections of Wordsworths Tintern.docx
Step 1Read the first two sections of Wordsworths Tintern.docxStep 1Read the first two sections of Wordsworths Tintern.docx
Step 1Read the first two sections of Wordsworths Tintern.docx
 
Step 1The first step in performing an IT audit that is tied to b.docx
Step 1The first step in performing an IT audit that is tied to b.docxStep 1The first step in performing an IT audit that is tied to b.docx
Step 1The first step in performing an IT audit that is tied to b.docx
 
Step 1Select ONE of the following fugal agents for your assignme.docx
Step 1Select ONE of the following fugal agents for your assignme.docxStep 1Select ONE of the following fugal agents for your assignme.docx
Step 1Select ONE of the following fugal agents for your assignme.docx
 

Recently uploaded

This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxNikitaBankoti2
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docxPoojaSen20
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIShubhangi Sonawane
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesEnergy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesShubhangi Sonawane
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 

Recently uploaded (20)

This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptx
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesEnergy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 

Steps to Secure Digital EvidenceWrite a detailed report of f.docx

  • 1. Steps to Secure Digital Evidence Write a detailed report of four to five pages in length explaining these steps and procedures. Identify a specific type of cybercrime and provide answers to the subsequent questions using the crime you selected. You will identify the likely digital items that need to be collected and then properly secure them. (The digital items can be thumb drives, CDs, cell phones, small, older hand-held game system play stations, Sony game systems, paper with passwords on them hidden under a mouse pad and in a desk, butterfly, etc.) You will document the steps taken to properly secure digital evidence that you have chosen to take into custody. Describe what “triage” of digital evidence means regarding cyber investigations. Explain chain of custody and how to secure and preserve digital evidence. Finally, you must ensure that the steps to secure evidence are completed, including identifying how the items will then be transported to the evidence technician’s station/office. As you answer the questions above, make sure you consider
  • 2. The importance of demonstrating that a forensic process was followed to a criminal or civil case. Address the impact on the case of using tools that are not vetted by the community. How you will use Write blockers to protect against inadvertently tainting evidence. Provide a discussion of the different ways that these can be implemented and an example of a specific vendor technology. Discuss how a hashing algorithm is used in a forensic investigation to prove evidence integrity and discuss how using a tool shown to cause collisions could be detrimental to the case. Provide an example of an algorithm used to authenticate the data. Use the American Psychological Association (APA) style (6th edition) to write your assignment. Remember to use quality references to support the ideas in your paper. Compose your work in a .doc or .docx file type using a word processor (such as Microsoft Word, etc.) and save it frequently to your computer.