Podcast
Questions and Answers
What is the role of a digital forensics investigator?
What is the role of a digital forensics investigator?
- gather evidence
- conduct investigation by processing digital evidence
- preserve evidence on a different computer
- prove a suspect has committed a crime/violated company policy
- summarize findings in a report
- present findings when required (to the prosecutor, in a court, to a company executive...)
What is a "Chain of Custody"?
What is a "Chain of Custody"?
Route the evidence takes from the time you find it until the case is closed or goes to court
What happens if you don’t know (or cannot establish) who took a suspect hard disk from the crime scene to the lab?
What happens if you don’t know (or cannot establish) who took a suspect hard disk from the crime scene to the lab?
- the chain of custody is broken
- the disk may have been tampered with
- the evidence's integrity is compromised
What does the information contained by computers help law enforcement determine?
What does the information contained by computers help law enforcement determine?
Signup and view all the answers
Digital evidence can be _______ ___________ by an overeager investigator
Digital evidence can be _______ ___________ by an overeager investigator
Signup and view all the answers
Law enforcement officers should ______ ______ _________ when acquiring the evidence
Law enforcement officers should ______ ______ _________ when acquiring the evidence
Signup and view all the answers
information on hard disks might be password protected so _________ _____ may need to be used in your investigation
information on hard disks might be password protected so _________ _____ may need to be used in your investigation
Signup and view all the answers
What are some examples of employee misuse of company resources?
What are some examples of employee misuse of company resources?
Signup and view all the answers
What are the steps to taking a systematic approach to problem solving?
What are the steps to taking a systematic approach to problem solving?
Signup and view all the answers
How can you determine the case requirements?
How can you determine the case requirements?
Signup and view all the answers
What activities should a basic investigation plan include?
What activities should a basic investigation plan include?
Signup and view all the answers
What is the purpose of an evidence of custody/chain-of-evidence form?
What is the purpose of an evidence of custody/chain-of-evidence form?
Signup and view all the answers
What are the two types of evidence of custody forms?
What are the two types of evidence of custody forms?
Signup and view all the answers
Why is documenting evidence during a forensics analysis very important?
Why is documenting evidence during a forensics analysis very important?
Signup and view all the answers
What is the multi-evidence form good for and what does it contain?
What is the multi-evidence form good for and what does it contain?
Signup and view all the answers
Describe a single-evidence form.
Describe a single-evidence form.
Signup and view all the answers
How can you secure your evidence?
How can you secure your evidence?
Signup and view all the answers
When dealing with private-sector high-tech investigations procedures, what should you develop?
When dealing with private-sector high-tech investigations procedures, what should you develop?
Signup and view all the answers
What do the majority of investigative work for termination cases involve?
What do the majority of investigative work for termination cases involve?
Signup and view all the answers
What are the predominant types of employee termination cases investigated?
What are the predominant types of employee termination cases investigated?
Signup and view all the answers
What do you need to prepare to conduct an internet abuse investigation?
What do you need to prepare to conduct an internet abuse investigation?
Signup and view all the answers
What steps outline outline the recommended processing of an Internet abuse case?
What steps outline outline the recommended processing of an Internet abuse case?
Signup and view all the answers
Step 4 of processing an internet abuse case: Compare the data recovered from forensic analysis to the proxy server log data to confirm that they match.
What should you do if the URL data matches the proxy server log and the forensic disk examination?
Step 4 of processing an internet abuse case: Compare the data recovered from forensic analysis to the proxy server log data to confirm that they match. What should you do if the URL data matches the proxy server log and the forensic disk examination?
Signup and view all the answers
Step 4 of processing an internet abuse case: Compare the data recovered from forensic analysis to the proxy server log data to confirm that they match.
What should you do if there are no matches between the proxy server logs, and the forensic examination shows no contributing evidence?
Step 4 of processing an internet abuse case: Compare the data recovered from forensic analysis to the proxy server log data to confirm that they match. What should you do if there are no matches between the proxy server logs, and the forensic examination shows no contributing evidence?
Signup and view all the answers
What do you need to prepare to conduct an email abuse investigation?
What do you need to prepare to conduct an email abuse investigation?
Signup and view all the answers
What steps outline the recommended processing of an E-mail abuse case?
What steps outline the recommended processing of an E-mail abuse case?
Signup and view all the answers
What things may lead to a media leak?
What things may lead to a media leak?
Signup and view all the answers
What do you need to consider to conduct a media leak investigation?
What do you need to consider to conduct a media leak investigation?
Signup and view all the answers
What steps outline the recommended processing of Media Leaks?
What steps outline the recommended processing of Media Leaks?
Signup and view all the answers
All suspected industrial espionage cases should be treated as ________ ______________
All suspected industrial espionage cases should be treated as ________ ______________
Signup and view all the answers
What kind of staff do you need to conduct industrial espionage investigations?
What kind of staff do you need to conduct industrial espionage investigations?
Signup and view all the answers
What guidelines should you follow when initiating industrial espionage cases?
What guidelines should you follow when initiating industrial espionage cases?
Signup and view all the answers
What steps outline the recommended processing of an industrial espionage case?
What steps outline the recommended processing of an industrial espionage case?
Signup and view all the answers
What is the difference between an interview and an interrogation?
What is the difference between an interview and an interrogation?
Signup and view all the answers
What is the role of a digital investigator in an interview?
What is the role of a digital investigator in an interview?
Signup and view all the answers
What are the ingredients to a successful interview or interrogation?
What are the ingredients to a successful interview or interrogation?
Signup and view all the answers