.

Tuesday, January 21, 2014

Forensics

A 14- year old girl is missing later having an argument with her p atomic number 18nts. They c each the police at midnight on whitethorn 28. A police researcher shows up within 30 minutes to interview them and finds out that the girl pass a lot of time on the internet. The parents agree to permit the investigator nominate her laptop. What steps should be taken adjacent? * I would read the parents to look at her history on the computing machine to see if they take on slew gain any in pulpation, finished chat logs and tell on a list of each(prenominal) her friends that they crawl in or dont know. * Then I would have a change of custody form signed by the parents authorizing me to take the computing device and investigate the contents using the approiate software. * I would log in all items taken and seal all access points with tape signed by me. The estimator would be localized in a safe environment for the data processor to protect the evidence and the property. * The data processor would be turned incessantlyywhere to the computer forensics lab by change of custody form to be invetigated for evidence that may lead to a place where the unseasoned female would go. * I I would then grammatical occurrence up a search warrant for her cell annunciate records while I was waiting on the forensics of the computer. * After forensics came punt end I would do the appropriate measures desire visit contacts or where ever the information leads me to go.
Ordercustompaper.com is a professional essay writing service at which you can buy essays on any topics and disciplines! All custom essays are written by professional writers!
Case Project 2-4: You are the computer forensic investigator for a law substantial. The firm acquired a new client, a young woman wh! o was blast from her duty for inappropriate files discovered on her computer, and she swears she never accessed the files. What questions should you ask and how should you run? 1. Was your system discussion protected? 2. Did anyone else know your password? 3. Where was you when these events occurred? 4. fall in you ever been convicted of this type of behavior forward? 5. Have you ever stepped away from your desk with your computer unlocked like a journey to the bathroom or out to lunch. 6....If you motive to get a full essay, order it on our website: OrderCustomPaper.com

If you want to get a full essay, visit our page: write my paper

No comments:

Post a Comment