100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
Previously searched by you
Summary ASSIGNMENT 6 ISSC451.docx ISSC 341 Assignment 6 Cybercrime ISSC451 (1) It s not to say that local law enforcement efforts against digital crimes are limited, its more or less based on population and knowledge. For this we need to look at the o$7.49
Add to cart
Summary ASSIGNMENT 6 ISSC451.docx ISSC 341 Assignment 6 Cybercrime ISSC451 (1) It s not to say that local law enforcement efforts against digital crimes are limited, its more or less based on population and knowledge. For this we need to look at the o
0 view 0 purchase
Course
CSU
Institution
Columbia Southern University
ASSIGNMENT 6 ISSC ISSC 341 Assignment 6 Cybercrime ISSC451 (1) It s not to say that local law enforcement efforts against digital crimes are limited, its more or less based on population and knowledge. For this we need to look at the overall population size and whether or not it would b...
assignment 6 issc451docx issc 341 assignment 6 cybercrime issc451 1 it s not to say that local law enforcement efforts against digital crimes are limited
its more or less based on popul
Written for
Columbia Southern University
CSU
All documents for this subject (454)
Seller
Follow
helperatsof1
Reviews received
Content preview
ISSC 341
Assignment 6
Cybercrime ISSC451
(1) It’s not to say that local law enforcement efforts against digital crimes are limited,
its more or less based on population and knowledge. For this we need to look at the overall
population size and whether or not it would be fiscally responsible for a police department
to invest their limited funding on providing digital crime education to their officers (NIJ
2004). For major metropolitan areas there is a larger likelihood that they would have a
cyber-crimes division that would be called to the scene based on the crime. In a small town
or a rural area where the area to cover is vast but the population is low one can discern that
the local PD
would not be adept to handling a major cybercrime, but may have had some basic training
for a single site crime scene dealing with someone’s computer. Even so, because of their lack
of knowledge in analyzing the evidence they would more than likely send the evidence
collected off to a state-run investigation facility.
(2) The best practices for the collection, preservation, transportation, and storage of
electronic evidence is mostly dependent on the crime scene itself. Overall the process is
similar, at the beginning stages, as a traditional “physical” crime scene. As in you want to
isolate the crimes scene, and document and photograph the scene as well. From there the
lead
investigator on scene, or even a first responder, should be able to assess if further assistance
will be needed in the handling of the digital evidence. At a bare minimum the first
responder should know what to do in the even digital evidence is being destroyed.
After the initial scene has been secured, documented and assessed, the collection
process can begin. For mobile devices, they need to be powered off with the battery
removed
(if applicable). Computers, hard drives, discs, and storage mediums need to be obtained as
well,
along with any manuals of cable and plugs. But they need to be carefully documented to
their set-up, configuration, and any current activity that was noticed at the scene. From here
you need to store them in anti-static containers or bags as to not allow moisture or static
build-up (Simplified 2013). If the computer is actively running you want to try and keep it
running in case there is any evidence that may be lost upon powering it down. This is where
specialized professionals would come into play. After transport to the lab or facility the
evidence then
needs to be stored in secure containers within a shielded environment to ensure the
evidence’s preservation.
(3) Chain of custody is one of, if not, the most important aspects to evidence collection
and transportation. The chain of custody ensures the integrity of the evidence and the case as
a whole. As law enforcement professionals form both big and small entities would most
certainly agree in the assessment that if your chain of custody on evidence is compromised
then too the case is compromised (Taylor 2014). The biggest reason that the chain exists is to
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller helperatsof1. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $7.49. You're not tied to anything after your purchase.