Question

Maintaining evidence integrity is one of the most important steps in the digital forensic investigation. Provide...

Maintaining evidence integrity is one of the most important steps in the digital forensic investigation. Provide some examples of how the integrity of evidence can be discredited during a digital forensic investigation. What are some ways that law enforcement can ensure that evidence integrity is maintained during a digital forensic investigation?

0 0
Add a comment Improve this question Transcribed image text
Answer #1

Digital forensic is defined as the application of forensic science techniques to computer-based material, Digital Forensics involves scientifically examining and analyzing data from computer storage media so that data can be used as evidence in court,
Is the process of identifying, preserving, analyzing and presenting digital evidence.

Never analyze the seized evidence directly. The original evidence must be secured and protected with a chain of custody. It should never be subjected to a forensic examination because of the fragile nature of digital evidence. A forensic copy, however, can be examined, and, if something goes wrong, can be discarded, and the copy process can be repeated. A good forensics process will prove that the forensic copy is identical to the original at the start and at the end of the examination. From a practical standpoint, investigators usually make multiple forensic copies and perform their analysis in parallel on the multiple copies.

For example, theft can now be done electronically, using bank cards and hacking into bank accounts. There is also the example of indecent images of minors being distributed freely and quicker via the internet than it would have been in the past.

*There is also the example of indecent images of minors being distributed freely and quicker via the internet than it would have been in the past.

Computer forensics investigators must have a solid understanding of computer science and related criminal activities. Confidence, assertiveness, persistence, determination, patience, and good problem-solving skills are essential characteristics. Computer forensics investigators must have excellent communication and ability to work as part of a team. They must not be afraid of confrontation and be able to think quickly on their feet. They should have a curious nature - one that leads you to want to dig and ask questions and keep at it until you figure out the answers. They should be organized, as they'll be dealing with a lot of information and they must be able to recognize patterns and see correlations. Excellent observation skills, and is capable of seeing both the minute details and the "big picture." Finally, they need to be able to meticulously document their findings and often, to be able to present them to others, who don't have the specialized knowledge, so they need both good writing skills and good speaking skills.

*The investigator should ensure that the evidence is preserved and secured well. If she fails to do so, the evidence will be inadmissible when it is submitted to a court of law. While collecting digital evidence at the crime scene, the investigator should take the following steps to secure it:

  • Follow departmental guidelines if possible or use 'A Guide for First Responders'
  • Document and verify the hardware configuration of the system to be examined
  • Disassemble the computer to be examined
  • Identify and document the internal storage devices
Add a comment
Know the answer?
Add Answer to:
Maintaining evidence integrity is one of the most important steps in the digital forensic investigation. Provide...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Law enforcement professionals and investigators use digital forensic methods to solve crimes every day. Locate one...

    Law enforcement professionals and investigators use digital forensic methods to solve crimes every day. Locate one current news article that explains how investigators may have used these techniques to solve a crime. Explain the crime that was solved and the methods used to determine how the crime was committed. Some examples of crimes solved may include locating missing children, finding criminals who have fled the scene of a crime, or unsolved crimes from the past that have been solved due...

  • What are some examples you can provide for each of the steps of the STAR method,...

    What are some examples you can provide for each of the steps of the STAR method, (Situation, Tasks, Action & Results)Why is using the STAR method during interviews important, What are some other ways to prepare for interview questions?

  • What is an expert? someone who has received specific training to provide expert testimony someone who...

    What is an expert? someone who has received specific training to provide expert testimony someone who through life experiences has gained some knowledge in a particular area someone who was formerly part of law enforcement or government someone who through education and/or experience has developed a deep understanding of a particular subject someone who has previously served as an expert in other fields 2) What are the special areas on forensic science? (multiple answer) pathology engineering astronautics odontology pharmacology toxicology...

  • Some analysts feel that one of the most important benefits of digital marketing is that marketers...

    Some analysts feel that one of the most important benefits of digital marketing is that marketers and customers can share information. That is, consumers can learn about products, brands, and retailers much more readily through online media. Have you ever looked up product information online? Have you used customer reviews of product you are considering buying? Have you ever participated in online contests? Have you ever complained online about a bad product or service? Given these new options, how will...

  • 1. Why is it important to provide evidence-based care? Discuss some of the challenges nurse administrators...

    1. Why is it important to provide evidence-based care? Discuss some of the challenges nurse administrators face in creating an environment in which bedside nurses use evidence-based care. 2. Discuss the use of run charts and control charts to improve quality. 3. Discuss how Lean thinking and Six Sigma can be used together to improve healthcare quality. 4. What are ways to promote employee safety? 5. Describe how complexity theory applies to your practice. 6. Explain the reasons that chaos...

  • please answer questions 26-42 vidence-gathering 26. Why is it important that evidence be tied to a...

    please answer questions 26-42 vidence-gathering 26. Why is it important that evidence be tied to a fraud theory? 27. What is the relationship between a fraud theory and the steps in the evidence- nd a court case process? 28. What are the relative roles of fraud theory, evidence, expert opinion, and a cou in fraud investigations? 29. Are expert opinions formed during the fraud investigation or only after it is finished Explain. 30. What are the investigator's primary roles in...

  • The list and dictionary object types are two of the most important and often used types...

    The list and dictionary object types are two of the most important and often used types in a Python program. Compare the functionalities of those two objects. What are some ways to insert, update, and remove elements from lists and dictionaries? Why would you choose one data type over another? Provide code examples demonstrating the usages of both data types.

  • There are multiple disciplinary requirements within the construct of an organization. It is incumbent upon the...

    There are multiple disciplinary requirements within the construct of an organization. It is incumbent upon the human resource department to ensure that policies and procedures exist that cover all factors associated with this topic. It is also likely that an organization will cover some of its disciplinary requirements within the context of a code of conduct. Legal requirements such as those imposed by the Civil Rights Act of 1964 should additionally be covered with the context of these policies and...

  • Attachment and Security are two of the most important things we can provide to infants. Those who have not learned t...

    Attachment and Security are two of the most important things we can provide to infants. Those who have not learned to attach to and trust their caregivers are more likely to experience trauma and relationship issues in the future. Learning to identify and appropriately express emotions and feelings is one of the most important things we can learn as people, however is really not taught to anyone, by anyone.... this is a great topic to think of in regard to...

  • Chapter 06 Applied Cryptography 1. How is integrity provided? A. Using two-way hash functions and digital...

    Chapter 06 Applied Cryptography 1. How is integrity provided? A. Using two-way hash functions and digital signatures B. Using one-way hash functions and digital signatures C. By applying a digital certificate D. By using asymmetric encryption 2. Which term refers to the matching of a user to an account through previously shared credentials? A. Nonrepudiation B. Digital signing C. Authentication D. Obfuscation 3. Which term refers to an arranged group of algorithms? A. Crypto modules B. Cryptographic service providers (CSPs)...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT