Give a brief explanation of a computer forensics lab auditing process.

What will be an ideal response?


ANSWER: To make sure security policies and practices are followed, conduct routine inspections to audit your lab and evidence storage containers. Audits should include, but aren’t limited to, the following facility components and practices:
- Inspect the lab’s ceiling, floor, roof, and exterior walls at least once a month, looking for anything unusual or new.
- Inspect doors to make sure they close and lock correctly.
- Check locks to see whether they need to be replaced or changed.
- Review visitor logs to see whether they’re being used properly.
- Review log sheets for evidence containers to determine when they have been opened and closed.
- At the end of every workday, secure any evidence that’s not being processed on a forensic workstation.

Computer Science & Information Technology

You might also like to view...

A member function that is declared ________ cannot use the this pointer.

A) private B) public C) static D) inline E) None of the above

Computer Science & Information Technology

Describe the characteristics of a table in Unnormalized Form (UNF) and describe how such a table is converted to a First Normal Form (1NF) relation.

What will be an ideal response?

Computer Science & Information Technology

Which of the following are Standard Template Library components?

a) Templates b) Generic Algorithms c) Template Containers d) Iterators e) Classes f) Structs

Computer Science & Information Technology

The ________ is the sequential advancing in a form from one field to the next

A) bound control B) calculated control C) tab order D) unbound control

Computer Science & Information Technology