Ryan_Gillard_ITDI_375_Unit1
.docx
keyboard_arrow_up
School
American InterContinental University *
*We aren’t endorsed by this school
Course
375
Subject
Computer Science
Date
Dec 6, 2023
Type
docx
Pages
5
Uploaded by ryangillard155
1
Digital Investigation Brief
Ryan Gillard
American Intercontinental University
ITDI 375 2103A-01: Digital Investigations I
Professor Liston, James
22 June 2021
2
There two types of digital forensic investigations and they are: public investigations and
private investigations. Public investigations “are conducted against the suspected people to detect
the crime scene” and “generally government agencies handle such types of investigations” (What
is Digital Forensics & How is it Used in Investigations, 2020). Public investigations are normally
conducted under criminal investigations since the investigations are usually done in tandem with
criminal cases. Private investigations “are carried out for crimes related to business, offices and
organizations” that involve “any kind of violation of the terms and policies of” the private sector
(What is Digital Forensics & How is it Used in Investigations, 2020). Private investigations are
also known as corporate investigations. Digital forensic investigations “is a step-by-step
procedure carried out meticulously” and “ii ensures that no original evidence is destroyed in the
process” while the examiner is in custody of the digital equipment in the case (What is Digital
Forensics & How is it Used in Investigations, 2020). There are five main steps to a digital
forensics investigation and they are: identification, collection, preservation, analysis, and
reporting. Identification is the very first step in the investigation because it involves where the
forensic person has to identify which pieces of digital equipment can be used to help in the case
and also later help with evidence. Collection of the digital equipment is the next step. Collection
is split into four different categories: volatile data collection, live system imaging, forensic
imaging, and seize digital devices physically. Volatile data collection is “the collection of all the
executing data like user-logged in details, date, time, and other RAM data” while the system is
on (What is Digital Forensics & How is it Used in Investigations, 2020). Live system imaging
“includes the imaging action performed on data during the examination” with the machine on
(What is Digital Forensics & How is it Used in Investigations, 2020). Forensic imaging
duplicates the original to perform imaging actions. The exact copies perform manipulations and
3
hashing techniques are used to make that privacy is maintained, while the system is off during
the process. Seizing digital devices physically is a last resort for when the previous methods fail.
During this collection, all devices are seized and all digital evidence that can be used will be
collected. The system can be on or off depending on the situation. Preservation is necessary
because it imperative that the crime scene is preserved and that “all the Electronically Stored
Information” is preserved even though it is removed from the scene (What is Digital Forensics &
How is it Used in Investigations, 2020). Analysis is the thorough investigation of all of the digital
evidence that is collected. Proper imaging is used to keep the validity of the evidence. The digital
investigation and the study of the crime scene can help the investigator come to a conclusion that
will potentially solve the crime.
Detectives will use markers to indicate directions and point out things that may be
unnoticeable to the naked eye due to being embedded into something or the direction that
something has moved. Flags “can be set in place to show the evidence to pathways of suspects, a
trail of blood, the pathways of projectiles, and items obscured in the surface covering” even if the
crime scene is “an indoor scene, outdoor scene, as well as inside a vehicle or vessel” (Byrd, n.d).
The detective will have the investigators take pictures from far away, midrange, and up close to
make sure that nothing is left out of the investigations and to make sure that any potential
evidence is captured within a picture. The evidence will have to be properly labeled so that it
does not get messed up, lost, or potentially destroyed on accident. The markers are used “in the
field as a successful tool that will reveal, simplify, organize and identify the numerous items of
evidence found at crime scenes”
(Byrd, n.d.). After the crime scene has been thoroughly
photographed from every angle in its undisturbed state, then markers (photo tents or flags) can
be used. “A series of photographs will then need to be taken from each prospective to
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Questions
"The impact of hacking on life" - For the last several years cyber-attacks/hacking are in the news on a seemingly continuous basis. Some of the most recent/largest hacking events include the Solarwinds hack that was the conduit for the major breach of many US Federal agencies and the disturbing Equifax hack from 2017. Have these events and the subsequent reporting caused you to change any habits/behaviors? Please provide your thoughts on this along with why you have or have not made any changes as a result of these events.
Hint: Please don't use chat gpt
arrow_forward
Personal data refers to a wide range of data types that all fall under the same umbrella phrase. How do governments maintain a balance between personal privacy and national security?
arrow_forward
Digital forensics investigators use specialized techniques gather, to analyse and preserve information on computer systems. An employee is suspected of operating his sheep business with a company computer. It's been alleged that he's tracking the sales price of the wool and the cost of feed and upkeep on spread sheets. What should the employer do? Write at least two pages explaining the tasks a Digital Forensics Investigator should perform.
arrow_forward
1. Information Privacy
A study by the Annenberg Public Policy Center at the University of Pennsylvania shows
that 95 percent of people who use the Internet at home think they should have a legal right
to know everything about the information that websites collect from them. Research also
shows that 57 percent of home Internet users incorrectly believe that when a website has
an information privacy policy it will not share personal information with other websites
or companies. In fact, the research found that after showing the users how companies
track, extract, and share website information to make money, 85 percent found the meth-
ods unacceptable, even for a highly valued site. Write a short paper arguing for or against
an organization's right to use and distribute personal information gathered from its website.
arrow_forward
Computer forensics is concerned with the acquisition and preservation of digital evidence. Briefly explain why digital evidence may be difficult to acquire and preserve, and list three reasonable sources of digital evidence.
arrow_forward
Meaning of abbreviations :
PDPA : Personal Data Protection Act 2010 Principles
GDPR : EU General Data Protection Regulation Principles
OECD : OECD Privacy Guidelines Principles
question
Which principle of the GDPR mentions that the company collecting your data should only collect data that is relevant to the purpose that they are collecting it and should not collect data from you that is not relevant to that purpose?
arrow_forward
Connections to areas where a person's right to privacy is guaranteed by the US Constitution.
arrow_forward
Identity theft occurs when someone acquires your personal information and uses it to hijack your finances. A common scenario is a thief using your Social Security number to open a credit card account in your name. When the thief does not pay, it is your credit history that is tarnished.
1. List three steps an individual should take to avoid identity theft.
2. List three steps a corporation that maintains your personal data in its information system should take to safeguard your data.
3. How can Internet activities contribute to the likelihood of identity theft? How can you prevent it from happening to you?
arrow_forward
Scenario; Janet spent most of her time using the internet to watch online movies, listen to music and most of all she is always connected to communicate with her parents who are OFW. She misses her parents that they communicate most of the time when both Janet and her parents are available for work and school. But one day Janet felt anxious that with her frequent communication with her parents somebody will invade their privacy and be able to access vital information like SSS number, bank account number, and family whereabouts. If you are the developer of the video call platform how will you ensure the safety of those people who are using the platform? What is your opinion regarding the use of information by an online platform? What other problems can you identify aside from security while doing an online platform?
arrow_forward
The digital divide is the severe social difference between information "haves" and "have-nots."
arrow_forward
Cybersecurity discussion
In 2013, Edward Snowden was hired by the NSA after previous employment with the CIA as a systems administrator. In early June of 2013 he revealed thousands of classified NSA documents to journalists Glenn Greenwald, Laura Poitras, Barton Gellman, and Ewen MacAskill about government surveillance programs. By June 21, 2013, the United States Department of Justice unsealed charges against Edward Snowden of two counts of violating the Espionage Act of 1917 and theft of government property, which identified the leak of state secrets as an act of treason.
Snowden has become a subject of controversy, both ethically and legally being seen as a traitor, a hero, a whistleblower, a dissident, and patriot.
Data Security and Privacy in the Age of Surveillance (Links to an external site.)
Edward Snowden: Patriot or Traitor? (Links to an external site.)
Edward Snowden is Both A Patriot and A Traitor (Links to an external site.)
Using the above short video and articles…
arrow_forward
connections to places where the US Constitution protects a person's
right to privacy.
arrow_forward
List any 3 exclusive rights of copyright owner
(Class: Professional Practices & Ethics)
arrow_forward
There are different countries in the world having different laws for for the protection of privacy and data. Such as
1. Data Privacy Act 2012, Philippines
2. Cyber Security Law China
3. General Data Protection Regulation (GDPR)- Europion Union
These laws provide best legislation to their users in terms of security and protection of data and privacy.
arrow_forward
Conduct a literature/online search to locate an event where there was a problem (i.e. something "went wrong") as a direct result of the personal health information existing in an electronic format.
In your initial post, answer the following:
Briefly, what was the situation?
What industry documented steps or best practices can/should be taken to avoid such an event from happening again in the future?
arrow_forward
Computer Forensic and Investigation:
1) Why is it important to analyze header data of emails during a digital forensics investigation?
2) Why all suspected industrial espionage cases should be treated as criminal investigations?
3) What is a network sniffer? Give an example to a network sniffer. What is the importance of it in Digital Forensics?
arrow_forward
Sarbanes-Oxley Compliance (SOX) of 2002 regulates financial data, operations, and assets for publically held companies. requires 5 key process steps. The Enron scandal of 2001 was one of the reasons the government enacted SOX. (True/False)
The purpose of OPSEC is to protect sensitive/unclassified information or data that could damage national security by revealing classified information. (True/False)
Choose all of the following that might put you in jeopardy of contracting malware:
Group of answer choices
Using your friend's computer
Opening a text from a person you don't know
Talking to someone you don't know on Facebook.
Opening email attachments from people that you do not know
iewing a web link with a shortened URL
Using pirated software
The origins of operational security were integrated by George Washington and Sun Tzu's military strategies. (True or False)
arrow_forward
Evidence preservation is critical in digital forensics. Discuss the goal of evidence preservation and elaborate on some of the challenges that forensic experts face in trying to preserve evidence. Research the library or the web for an example of a case or story where poor preservation of evidence compromised a legal case. Share highlights of how this happened, and how it could have been prevented.
arrow_forward
What does it mean for privacy to be both a negative (liberty) and a positive (right)? (claim rights)
arrow_forward
225. Suicide Hackers are those _________
a) who break a system for some specific purpose with or without keeping in mind that they may suffer long term imprisonment due to their malicious activity
b) individuals with no knowledge of codes but an expert in using hacking tools
c) who know the consequences of their hacking activities and hence try to prevent them by erasing their digital footprints
d) who are employed in an organization to do malicious activities on other firms
arrow_forward
Cyberterrorism and cyberespionage pose threats to U.S. national security. Some activities in cyberspace are geared to generate societal fear and uncertainty. Cyberterrorism is seen by many to surpass terrorism as a threat.Answer the following question(s):1. Provide an example of cyberterrorism. How does this example violate norms and rules?2. Does this example pose a threat to U.S. national security? Why or why not?
arrow_forward
List three questions that should be asked in a computer forensics investigation.
hint: Computer forensics, or digital forensics, is the identification, collection, examination, and analysis of data while preserving the integrity of the information and maintaining a strict chain of custody.
arrow_forward
Meaning of abbreviations :
PDPA : Personal Data Protection Act 2010 Principles
GDPR : EU General Data Protection Regulation Principles
OECD : OECD Privacy Guidelines Principles
question :
Which principle of the OECD mentions that any company must inform you the reason why they are collecting your data?
arrow_forward
Computer ethics question:
An amber alert is activated in your hometown (this is when a child goes missing and authorities issue a county-wide or state-wide search for that individual). All security cameras, traffic cameras, local police and the public try to find a white pickup truck with a broken left brake light and Florida license plates in order to quickly locate the missing child. (no, this is not Dave's car)
This would be an example of what type of data science practice?
arrow_forward
Identity theft—the theft of personal information—continues to worry consumers and businesses. You are the database administrator for a large company with a gigantic Internet-accessible database. How would you prevent data thieves from collecting personal information from a corporate database?
arrow_forward
Information technology explain briefly the following rights of the data subject:
The right to be informed.
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education
Related Questions
- "The impact of hacking on life" - For the last several years cyber-attacks/hacking are in the news on a seemingly continuous basis. Some of the most recent/largest hacking events include the Solarwinds hack that was the conduit for the major breach of many US Federal agencies and the disturbing Equifax hack from 2017. Have these events and the subsequent reporting caused you to change any habits/behaviors? Please provide your thoughts on this along with why you have or have not made any changes as a result of these events. Hint: Please don't use chat gptarrow_forwardPersonal data refers to a wide range of data types that all fall under the same umbrella phrase. How do governments maintain a balance between personal privacy and national security?arrow_forwardDigital forensics investigators use specialized techniques gather, to analyse and preserve information on computer systems. An employee is suspected of operating his sheep business with a company computer. It's been alleged that he's tracking the sales price of the wool and the cost of feed and upkeep on spread sheets. What should the employer do? Write at least two pages explaining the tasks a Digital Forensics Investigator should perform.arrow_forward
- 1. Information Privacy A study by the Annenberg Public Policy Center at the University of Pennsylvania shows that 95 percent of people who use the Internet at home think they should have a legal right to know everything about the information that websites collect from them. Research also shows that 57 percent of home Internet users incorrectly believe that when a website has an information privacy policy it will not share personal information with other websites or companies. In fact, the research found that after showing the users how companies track, extract, and share website information to make money, 85 percent found the meth- ods unacceptable, even for a highly valued site. Write a short paper arguing for or against an organization's right to use and distribute personal information gathered from its website.arrow_forwardComputer forensics is concerned with the acquisition and preservation of digital evidence. Briefly explain why digital evidence may be difficult to acquire and preserve, and list three reasonable sources of digital evidence.arrow_forwardMeaning of abbreviations : PDPA : Personal Data Protection Act 2010 Principles GDPR : EU General Data Protection Regulation Principles OECD : OECD Privacy Guidelines Principles question Which principle of the GDPR mentions that the company collecting your data should only collect data that is relevant to the purpose that they are collecting it and should not collect data from you that is not relevant to that purpose?arrow_forward
- Connections to areas where a person's right to privacy is guaranteed by the US Constitution.arrow_forwardIdentity theft occurs when someone acquires your personal information and uses it to hijack your finances. A common scenario is a thief using your Social Security number to open a credit card account in your name. When the thief does not pay, it is your credit history that is tarnished. 1. List three steps an individual should take to avoid identity theft. 2. List three steps a corporation that maintains your personal data in its information system should take to safeguard your data. 3. How can Internet activities contribute to the likelihood of identity theft? How can you prevent it from happening to you?arrow_forwardScenario; Janet spent most of her time using the internet to watch online movies, listen to music and most of all she is always connected to communicate with her parents who are OFW. She misses her parents that they communicate most of the time when both Janet and her parents are available for work and school. But one day Janet felt anxious that with her frequent communication with her parents somebody will invade their privacy and be able to access vital information like SSS number, bank account number, and family whereabouts. If you are the developer of the video call platform how will you ensure the safety of those people who are using the platform? What is your opinion regarding the use of information by an online platform? What other problems can you identify aside from security while doing an online platform?arrow_forward
- The digital divide is the severe social difference between information "haves" and "have-nots."arrow_forwardCybersecurity discussion In 2013, Edward Snowden was hired by the NSA after previous employment with the CIA as a systems administrator. In early June of 2013 he revealed thousands of classified NSA documents to journalists Glenn Greenwald, Laura Poitras, Barton Gellman, and Ewen MacAskill about government surveillance programs. By June 21, 2013, the United States Department of Justice unsealed charges against Edward Snowden of two counts of violating the Espionage Act of 1917 and theft of government property, which identified the leak of state secrets as an act of treason. Snowden has become a subject of controversy, both ethically and legally being seen as a traitor, a hero, a whistleblower, a dissident, and patriot. Data Security and Privacy in the Age of Surveillance (Links to an external site.) Edward Snowden: Patriot or Traitor? (Links to an external site.) Edward Snowden is Both A Patriot and A Traitor (Links to an external site.) Using the above short video and articles…arrow_forwardconnections to places where the US Constitution protects a person's right to privacy.arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Database System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSON
- C How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education