Cyber Crime Case Study

User Generated

Fhev5924

Computer Science

Description

Describe the process you would follow to conduct search; including: preparation for, identify/secure, collect, and store evidence.

Writing Requirements

  • 3–4 pages in length (excluding cover page, abstract, and reference list)
  • Include at least two peer reviewed sources that are properly cited
  • APA format,

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

View attached explanation and answer. Let me know if you have any questions.

1
Case Study Outline
Thesis Statement: Working in the field to conduct a search for cyber-criminal activities
entails preparation, identification, collection, acquisition, and storage and reporting the evidence.
1. Preparation
A. The preparation for the process to conduct a search involves following and applying
the policies and procedures required to ensure that the evidence gathered is not
compromised and it is well handled and protected.
2. Identification
A. In the identification stage, information is obtained about the case being created before
the process of collecting digital evidence is started.
3. Evidence Collection
A. The third process entails the collection of the digital devices, servers, and systems
that hold the digital evidence required.
4. Evidence Acquisition
A. The acquisition process is the most critical process in the investigations process,
requiring detailed planning.
5. Storage and Documentation of the Evidence
A. Storage and documentation of evidence is a significant process that ensures collected
data is properly stored to be used during a case.
6. Conclusion
A. The crucial process to follow to search and store cyber-crime related evidence
requires the preparation to collect the evidence.

2
B. Next is the identification of the crime committed to establish the need for an
investigation, collection of physical evidence, such as hardware, acquisition of digital
proof, and effective storage of the data.


1

Case Study

Student’s Name
Institutional Affiliation
Professor’s Name
Course
Date

2

Case Stu...


Anonymous
Great study resource, helped me a lot.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags