Several types of devices

Assignment Help Business Management
Reference no: EM131272477

This week's reading takes you from the general discussion we held last week into some more specific details about the role of both criminal justice and non-criminal justice professionals in the IT and computer forensics world, as well as why it is important that you understand the basic principles and concepts of the criminal justice process.  Then we get into the meat of what you would do and how you would interface with law enforcement in the event you have to conduct a forensic system analysis.  The readings in week 2 again stress the importance of understanding the criminal justice process, as well as discusses different types of devices or file systems that may contain information critical to your analysis.

Among the basic concepts to understand this week are that there are many types of evidence one could find in digital data.  Understanding what data you may find, even if it is not evidence of a crime, is important to preparing a digital examination/analysis plan. Let's look at anon-technical example...

When a law enforcement officer applies for a warrant to search a residence, the officer must specify for what it is he or she is searching; if the case involves a stolen car, then the officer's search will be limited to only those locations a stolen car, or pieces of a stolen car (in case it was chopped), could be located. It would be unwise to just list the stolen car on the warrant, as (in the interpretation of the court) might only limit the officer to the whole car, intact.  So, the officer has to determine at the outset of their search what could have happened to the car (attempting to account for all the possibilities) so his or her search is complete (and most likely to yield results).  The officer will also have to justify (in the affidavit) why he or she believes that the car could be found in smaller pieces.  To that end, an officer with auto theft experience may also be able to state that, in his or her experience, stolen cars are often broken down into smaller components, which can be identified with certainty as belonging to the original stolen car, as well as where such components could be hidden.  It would most likely not tbe enough for the officer to simply assert that cars are broken down and sold for parts, if he or she wants to justify seizing an ashtray; the ashtray would need some specific characteristics to do that.

Search warrants and searches are, therefore, most often limited in scope to items for which the searcher is looking (i.e., nearly always evidence of a crime or wrongdoing). You cannot look for an elephant in a kitchen drawer! I know that sounds absurd, but it is an excellent metaphor... However, if you were looking for narcotics, they could be hidden almost anywhere, and you could justify a much broader search.  In this example, digital evidence is much more akin to narcotics than you may think, with evidential data often occurring in hidden, strange, or unlikely places.  As such, warrants to search for digital evidence often cast a "wide net," but cannot be so overly broad as to not be supported by probable cause or violate someone's 4th amendment protections and implied rights to privacy.

Do not despair, however, if you are not a law enforcement officer... The requirement to obtain a search warrant does not apply to searches by private individuals or non-government organizations, as long as the individual(s) have the authority to conduct the search (e.g., IT security personnel are searching a computer owned by their company for company data, or an employee gives the company consent to search for their personal data).  However, even those searches may be limited to certain parts of the computer system(s) or network(s).  As noted in the text, if a person is allowed to use a personally-owned flash drive at work, and that drive is connected to the computer, you still may not be able to search it without the employee's consent.  All of these examples depend heavily on established company policies and what warnings were given to the employee.

The readings this week identifies several types of devices on which digital evidence could be found. For this week's discussion, please list two of the devices provided by the text (or other devices, if you prefer), state what types of evidence you would look for on those devices, and explain what limitations you might have or what hurdles you would have to clear before searching those devices (BOTH as a company IT professional and a law enforcement officer).  Identify what, if any, policies would need to be in place for you to search as a private employee, as well as what limits can be placed on the search by police. Please discuss thoroughly, and respond in a substantive, intelligent way to at least one of your fellow classmates.

Reference no: EM131272477

Questions Cloud

Explain the advantages of training in safety : What are the 5E?s for accident prevention?-  Explain the advantages of training in safety? -  List the basic prevention measures of industrial fire.
Which market structure you would prefer for selling products : Describe which market structure you would prefer for selling products. Explain why and support your answer with the characteristics of that market.
Explain the logic behind of your model inclusion of variable : Explain the logic behind of your model, inclusion of variables, statistical method used..ect. State your expectations of the signs of the regressors (specify the hypothesis you would like to test with the data).
How would you overcome the defenses to the alleged breach : Imagine you represent a person who claims to have been the victim of a breach of contract. Determine the information that you would need to know to best determine if there was a contract. How would you present a case to a court to show your client..
Several types of devices : The readings this week identifies several types of devices on which digital evidence could be found. For this week's discussion, please list two of the devices provided by the text (or other devices, if you prefer), state what types of evidence yo..
Static method to check the guess : The program should also contain a static method to display the round number, a static method to allow the player to make a guess, a static method to check the guess, a static method to display the points, and a static method to display the winner...
Design heat exchanger cl for the process : Your job is to design heat exchanger Cl for the process to produce aromatics from shale gas. Details of the process have been given in the handouts in CHE 300.
What role will prisons play in the future : Will the focus be punishment or treatment? Does the state have a responsibility to train inmates with employment skills? Should we allow inmate labor (prison industries) as a for-profit industry?
Discussing the effects of social networking : In your opinion and based on your research, submit a post discussing the effects of social networking including its benefits, its negative influences, and how a Christian should deal with the technology?

Reviews

Write a Review

Business Management Questions & Answers

  Model of training processesdescribe how the model of

model of training processesdescribe how the model of training processes serves as a problem-solving tool. include a

  Protecting the company against fraud - mf global

Show what measures can and should be taken to make it easier for corporate employees to? Blow the whistle? On a fraudulent scheme within an organization.

  Hospitality industry experience and management

Hospitality Industry Experience and Management - Discuss how this experience falls within the definition of hospitality management.

  Preparing analyses that will present the business value

In the third part, the focus is on preparing analyses that will present the business value proposition of the BI technology to C-level Executive Teams

  Current market evolution of canada

Current market evolution of canada

  Satisfy the four rs of environmentally

How can marketers satisfy the Four Rs of environmentally correct practice? See, for example, the approaches proposed by Duales System Deutschland (www.gruener-punkt.de).

  Benefit and costs of fdi to home and host countries

Describe taking into consideration any country the benefits and costs of FDI to home and host countries?

  Situational analysis is at the heart of strategizing

"Situational analysis is at the heart of strategizing and should be done both internally and externally." Why do you agree with this quote? As best you can, fully explain your answer.

  Remaining amount of what is owed

Mike sent the bill to the Fowlers for $7,500 on July 20 but the Fowlers failed to pay. If the Folwers do not pay, can Mike recover his fees? If so, how? Say the Fowlers only pay $4,000, can Mike get the remaining amount of what is owed? If so,..

  Fairness between auditors and companies

Practicing professionals should place the public interest above the interests of clients, particularly when participating in a procedure created to develop standards expected to obtain fair presentation.

  Formal organization of producers

State what is a formal organization of producers that agree to coordinate prices and production.

  Databases and advantages of wireless networks for businesses

Why do some businesses have separate databases and a data warehouse? Why wouldn't most businesses have just one large database for all their data, both current and historical?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd