Friday, May 10, 2019

Computer Forensics Assignment 2 Essay Example | Topics and Well Written Essays - 500 words

Computer Forensics assigning 2 - Essay ExampleThat demands setting up certify storage drive outer or lockers. Such lockers look into security of enjoin stored and restricted access by authorized staff. Locks installed should be of high quality and pitch limited possibilities of distribution of duplicate-keys.Evidence storages should be subject to regular inspections to ensure only current evidence are kept therein and closed courtings evidence are relocated to secure locations in an off-site facility. The evidence container should be in a position restricted to authorized staff members and the number of good deal granted access should be minimum. Furthermore, only authorized staff members should inspect lock combinations. In case the investigations use intel-based PCs, computers are necessary. There is need to acquire the right Operating Systems (OS) and other applications. Computer forensics bundle product package should form part of the software acquired (Nelson, Phillips & Steuart, 2009). Specialized software are similarly important. They include software such as Peachtree. Disk-editing software are also necessary for evidence analysis (Nelson, Phillips & Steuart, 2009).Computers may contain incriminating evidence including DNA but professional curiosity has a potential to destroy evidence. It is, therefore, strident to properly document, collect and package the evidence from a crime scene. The U.S DOJ standards for seizing digital evidence are applicable (The Office of Legal Education, 2011). In the case of a drug dealers computer, the following process should be applicable. The investigator should seize the computer together with other peripherals found at the scene. Peripherals include cell phones, scanners and cameras. Printers CDs, DVDs and USB devices should also be seized.After that, the investigators should recognize information that can serve as evidence from the scene of crime. The next stage is to document the evidence

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.