Describe the steps of a forensic examination of a cyber crime and what the examination of the contents of the computer files would include

What will be an ideal response?


A good answer should include the seizure of the suspect's computer via a warrant, searching the computer either through a blunt force attack or social engineering techniques. Answers should also include information that can be gleaned through a history search, calendars, emails, spreadsheets, picture files and deleted files.

Criminal Justice

You might also like to view...

One of the first studies dealing with elder abuse and published in 1979 was ____

Fill in the blank(s) with correct word

Criminal Justice

Diversion attempts to keep offenders from the negative effects of _______, while at the same time providing rehabilitation programs in the community that address challenges the offender may face.

A. embarrassment B. interrogation C. incarceration D. social shunning

Criminal Justice

Places from which a significant portion of all police calls originate, such as taverns and housing projects, are referred to as _______.

Fill in the blank(s) with the appropriate word(s).

Criminal Justice

The method by which individuals are assumed to logically weigh the anticipated benefits of a given course of action against its possible costs is known as ______.

a. the utilitarian principle b. hedonistic calculus c. the punishment doctrine d. the Code of Hammurabi

Criminal Justice