Podcast
Questions and Answers
What is the role of a digital forensics investigator?
What is the role of a digital forensics investigator?
- gather evidence
- conduct investigation by processing digital evidence
- preserve evidence on a different computer
- prove a suspect has committed a crime/violated company policy
- summarize findings in a report
- present findings when required (to the prosecutor, in a court, to a company executive...)
What is a "Chain of Custody"?
What is a "Chain of Custody"?
Route the evidence takes from the time you find it until the case is closed or goes to court
What happens if you don’t know (or cannot establish) who took a suspect hard disk from the crime scene to the lab?
What happens if you don’t know (or cannot establish) who took a suspect hard disk from the crime scene to the lab?
- the chain of custody is broken
- the disk may have been tampered with
- the evidence's integrity is compromised
What does the information contained by computers help law enforcement determine?
What does the information contained by computers help law enforcement determine?
Digital evidence can be _______ ___________ by an overeager investigator
Digital evidence can be _______ ___________ by an overeager investigator
Law enforcement officers should ______ ______ _________ when acquiring the evidence
Law enforcement officers should ______ ______ _________ when acquiring the evidence
information on hard disks might be password protected so _________ _____ may need to be used in your investigation
information on hard disks might be password protected so _________ _____ may need to be used in your investigation
What are some examples of employee misuse of company resources?
What are some examples of employee misuse of company resources?
What are the steps to taking a systematic approach to problem solving?
What are the steps to taking a systematic approach to problem solving?
How can you determine the case requirements?
How can you determine the case requirements?
What activities should a basic investigation plan include?
What activities should a basic investigation plan include?
What is the purpose of an evidence of custody/chain-of-evidence form?
What is the purpose of an evidence of custody/chain-of-evidence form?
What are the two types of evidence of custody forms?
What are the two types of evidence of custody forms?
Why is documenting evidence during a forensics analysis very important?
Why is documenting evidence during a forensics analysis very important?
What is the multi-evidence form good for and what does it contain?
What is the multi-evidence form good for and what does it contain?
Describe a single-evidence form.
Describe a single-evidence form.
How can you secure your evidence?
How can you secure your evidence?
When dealing with private-sector high-tech investigations procedures, what should you develop?
When dealing with private-sector high-tech investigations procedures, what should you develop?
What do the majority of investigative work for termination cases involve?
What do the majority of investigative work for termination cases involve?
What are the predominant types of employee termination cases investigated?
What are the predominant types of employee termination cases investigated?
What do you need to prepare to conduct an internet abuse investigation?
What do you need to prepare to conduct an internet abuse investigation?
What steps outline outline the recommended processing of an Internet abuse case?
What steps outline outline the recommended processing of an Internet abuse case?
Step 4 of processing an internet abuse case: Compare the data recovered from forensic analysis to the proxy server log data to confirm that they match.
What should you do if the URL data matches the proxy server log and the forensic disk examination?
Step 4 of processing an internet abuse case: Compare the data recovered from forensic analysis to the proxy server log data to confirm that they match. What should you do if the URL data matches the proxy server log and the forensic disk examination?
Step 4 of processing an internet abuse case: Compare the data recovered from forensic analysis to the proxy server log data to confirm that they match.
What should you do if there are no matches between the proxy server logs, and the forensic examination shows no contributing evidence?
Step 4 of processing an internet abuse case: Compare the data recovered from forensic analysis to the proxy server log data to confirm that they match. What should you do if there are no matches between the proxy server logs, and the forensic examination shows no contributing evidence?
What do you need to prepare to conduct an email abuse investigation?
What do you need to prepare to conduct an email abuse investigation?
What steps outline the recommended processing of an E-mail abuse case?
What steps outline the recommended processing of an E-mail abuse case?
What things may lead to a media leak?
What things may lead to a media leak?
What do you need to consider to conduct a media leak investigation?
What do you need to consider to conduct a media leak investigation?
What steps outline the recommended processing of Media Leaks?
What steps outline the recommended processing of Media Leaks?
All suspected industrial espionage cases should be treated as ________ ______________
All suspected industrial espionage cases should be treated as ________ ______________
What kind of staff do you need to conduct industrial espionage investigations?
What kind of staff do you need to conduct industrial espionage investigations?
What guidelines should you follow when initiating industrial espionage cases?
What guidelines should you follow when initiating industrial espionage cases?
What steps outline the recommended processing of an industrial espionage case?
What steps outline the recommended processing of an industrial espionage case?
What is the difference between an interview and an interrogation?
What is the difference between an interview and an interrogation?
What is the role of a digital investigator in an interview?
What is the role of a digital investigator in an interview?
What are the ingredients to a successful interview or interrogation?
What are the ingredients to a successful interview or interrogation?