List and discuss the primary types of computer crime evidence and how they should be collected and preserved
What will be an ideal response?
• The computer itself has transaction journal, user identification, terminal location, e-mail log, and media storage disks/cards evidence. Printer activity can also produce evidence of computer crime. Physical evidence can come from source documents, handwritten notes, and photographs, while suspect evidence can include statements, background, personal habits, and attendance. Collection of evidence must comport with search warrants, which can be tricky given the need for particular wording, and special care is needed to protect computer crime evidence from physical damage (including magnetic tape and disks, printed computer listings, the computer itself, and additional hardware and add-on devices).
You might also like to view...
The presence of prostate specific antigen (PSA), or p30, is useful for identifying a sample stain containing semen
Indicate whether the statement is true or false.
______ are laws that define criminal acts and how such acts will be punished.
A. Criminal law B. Civil law C. Criminal justice D. Natural law
The U.S. Supreme Court recently ruled that it is unconstitutional to notify a community where a former sex offender lives
a. True b. False Indicate whether the statement is true or false
In an emergency situation, which of the following communications can be issued with relative ease, since concurrence by those affected is not sought?
a. Free rein b. Autocratic c. Democratic d. Dual Track