Identify a specific type of cybercrime


Assignment: Information Tech

Steps to Secure Digital Evidence

Write a detailed report of four to five pages in length explaining these steps and procedures.

Identify a specific type of cybercrime and provide answers to the subsequent questions using the crime you selected.

a) You will identify the likely digital items that need to be collected and then properly secure them. (The digital items can be thumb drives, CDs, cell phones, small, older hand-held game system play stations, Sony game systems, paper with passwords on them hidden under a mouse pad and in a desk, butterfly, etc.)

b) You will document the steps taken to properly secure digital evidence that you have chosen to take into custody.

c) Describe what "triage" of digital evidence means regarding cyber investigations.

d) Explain chain of custody and how to secure and preserve digital evidence.

e) Finally, you must ensure that the steps to secure evidence are completed, including identifying how the items will then be transported to the evidence technician's station/office.

As you answer the questions above, make sure you consider

a. The importance of demonstrating that a forensic process was followed to a criminal or civil case. Address the impact on the case of using tools that are not vetted by the community.

b. How you will use Write blockers to protect against inadvertently tainting evidence. Provide a discussion of the different ways that these can be implemented and an example of a specific vendor technology.

c. Discuss how a hashing algorithm is used in a forensic investigation to prove evidence integrity and discuss how using a tool shown to cause collisions could be detrimental to the case. Provide an example of an algorithm used to authenticate the data.

Format your assignment according to the give formatting requirements:

• The answer must be using Times New Roman font (size 12), double spaced, typed, with one-inch margins on all sides.

• The response also includes a cover page containing the student's name, the title of the assignment, the course title, and the date. The cover page is not included in the required page length.

• Also include a reference page. The references and Citations should follow APA format. The reference page is not included in the required page length.

Solution Preview :

Prepared by a verified Expert
Management Information Sys: Identify a specific type of cybercrime
Reference No:- TGS03046498

Now Priced at $40 (50% Discount)

Recommended (96%)

Rated (4.8/5)