Chain of Custody, computer science assignment help

User Generated

waj1027

Computer Science

Description

  • Each part needs to be three to four pages. This is going to be all one paper!

    APA style

    Add a table of contents

    Reference page not included in 3-4 pages for each part

  • Part 1

  • Chain of Custody

  • What physical and electronic evidence can you as the investigator obtain?
  • How would you safeguard that evidence?
  • How would you create a chain of custody for this evidence?
  • What are the limitations when protecting evidence only found online or in the cloud?

Before writing this section, complete the following:

Part 2

Chain of Custody Concerns

For this assignment, you will conduct Internet research and discuss the causes for why electronic evidence may be found inadmissible in court. Be sure to address the following:

  • Spoliation
  • Tampering
  • Fruit of the poisonous tree

The following are the project deliverables:



User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

Running head: e- Evidence

1

Name of student

Unit and course code

Name of institution

Name of instructor

Date

e- Evidence

2
Table of content

Content

page number

Types of electronic evidence…………………………………………3
Methods of safeguarding evidence…………………………………..4

Ways of creating a chain of custody…………………………………5

Limitations when protecting e-evidence…………………………….6
Nullification of evidence in court…………………………………..7
References…………………………………………………………..9

e- Evidence

3

What physical and electronic evidence can you as the investigator obtain?

Apart from physical devices which are apprehended by the law of execution, digital
evidence ought to be unruffled and evaluated from schmoozed devices, in cooperation with
assemblages of IT systems and single servers. These schmoosed devices might be above the
scope of law enforcers. Additionally, questioning might also encompass both dead box disk
based forensics, and network handling in memory analysis.
Computer – There might be an affluence of credible digital evidence specifically on
personal computers. During browsing through the internet, websites may sometime preserve
flash cookies, browsing history or even internet pages and files. Messages including emails or
social media inboxes might be discovered in computers too.

Transportable electronics – Presently, digital proof dispensation from mobile
electronics, for example cell phones, are becoming a prime focus of interest to examiners
critically. Therefore, there ought to be no traces of surprise that mobile phones and other portable
electronic devices are becoming a center of interest surrounding the world of digital evidence.

Internet –File exchanging networks are among the principal source used in the course of
investigations. Developers have taken risks to themselves by assembling some internet
technologi...


Anonymous
This is great! Exactly what I wanted.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags