Computer Forensics

When processing a crime scene that contains cyber evidence, there are three main categories of evidence. Areas to be searched may be obvious, such as a desk with a computer on it or drawers containing computer-related material. Other areas, such as suspended ceilings and adjacent rooms may also be important. Local Area Networks (LANS) will often connect multiple computers, tablets, and smartphones to each other. In addition, either intentionally or for functional aesthetics, devices supporting connections and even power backup may be concealed in suspended ceilings, behind panels, or in adjacent rooms/closets.
Research and identify the following types of evidence that may be found in a multi-computer crime scene and that should be seized:

Category 1: Remember that hardware means a physical device that computes, stores virtual files, scans, or prints.
Category 2: Software may be in various forms and contains programs that can be loaded onto computer hardware to perform functions. Software by itself cannot do anything.
Category 3: The lab needs to set up the computer-seized items using the same materials brought from the crime scene in the same configuration. This includes power sources, connection cables, and wireless connection devices.
List 3 items of evidence from each category, and briefly identify their function.

Computer Forensics

When processing a crime scene that contains cyber evidence, there are three main categories of evidence. Areas to be searched may be obvious, such as a desk with a computer on it or drawers containing computer-related material. Other areas, such as suspended ceilings and adjacent rooms may also be important. Local Area Networks (LANS) will often connect multiple computers, tablets, and smartphones to each other. In addition, either intentionally or for functional aesthetics, devices supporting connections and even power backup may be concealed in suspended ceilings, behind panels, or in adjacent rooms/closets.
Research and identify the following types of evidence that may be found in a multi-computer crime scene and that should be seized:

Category 1: Remember that hardware means a physical device that computes, stores virtual files, scans, or prints.
Category 2: Software may be in various forms and contains programs that can be loaded onto computer hardware to perform functions. Software by itself cannot do anything.
Category 3: The lab needs to set up the computer-seized items using the same materials brought from the crime scene in the same configuration. This includes power sources, connection cables, and wireless connection devices.
List 3 items of evidence from each category, and briefly identify their function.

Computer Forensics

 

When processing a crime scene that contains cyber evidence, there are three main categories of evidence. Areas to be searched may be obvious, such as a desk with a computer on it or drawers containing computer-related material. Other areas, such as suspended ceilings and adjacent rooms may also be important. Local Area Networks (LANS) will often connect multiple computers, tablets, and smartphones to each other. In addition, either intentionally or for functional aesthetics, devices supporting connections and even power backup may be concealed in suspended ceilings, behind panels, or in adjacent rooms/closets.
Research and identify the following types of evidence that may be found in a multi-computer crime scene and that should be seized:

Category 1: Remember that hardware means a physical device that computes, stores virtual files, scans, or prints.
Category 2: Software may be in various forms and contains programs that can be loaded onto computer hardware to perform functions. Software by itself cannot do anything.
Category 3: The lab needs to set up the computer-seized items using the same materials brought from the crime scene in the same configuration. This includes power sources, connection cables, and wireless connection devices.
List 3 items of evidence from each category, and briefly identify their function.

Computer Forensics

Computer Forensics is a fast growing and ever changing field of study. Describe the qualities and skill-set to be looked for in an Incident Response Team.
Discuss the future trends and directions that you see computer forensics headed.
Using the Online Library, find an article, case study, or publication about your favorite topic covered in this computer forensics course – then summarize the article in a paragraph and submit your summary along with a copy of the article or the link of the article to this discussion for sharing.