This essay has been submitted by a student. This is not an example of the work written by professional essay writers.
Uncategorized

STEPS DESCRIBING FORENSIC PROCESS

Pssst… we can write an original essay just for you.

Any subject. Any type of essay. We’ll even meet a 3-hour deadline.

GET YOUR PRICE

writers online

STEPS DESCRIBING FORENSIC PROCESS

  1. Describe the business scenarios that require digital evidence
  • look at the risk and potential impact on the business from the various types of crimes and disputes.
  • The aim of understanding business scenarios benefits the organization in the following ways:
  • They reduce the impact of computer-related crime
  • Dealing with court orders to release data
  1. Identify different types of potential evidence
  • The purpose of this step is to source what evidence may be available from across the range of systems and applications in use.
  • Evidence sources include:
  • Equipment such as routers, firewalls, servers, clients, portables.
  • Application software, such as accounting packages for evidence of fraud and activities
  1. Determine the evidence collection requirement

The purpose of this step is to produce an evidence requirement statement so that those responsible for managing the business risk can communicate with those running and monitoring information systems through an agreed requirement for evidence.

  1. Establish a capability for securely gathering legally admissible evidence to meet the requirement.

The organization knows the totality of evidence available and has decided which can be collected to address the company risks within a planned budget. The next step is to ensure that it is collected from the relevant sources and preserved as an authentic record with the evidence.

  1. Establish a policy for secure storage and handling of potential evidence.

This step aims to secure the evidence for the longer term once collected and facilitate its retrieval if required. It concerns the long-term or off-line storage of information that might be required for evidence at a later date.

  1. Ensure monitoring and auditing are targeted to detect and deter major incidents.

Evidence sources can be monitored to detect threatened incidents on time. It is all very well collecting the evidence, but this step is about making sure it can be used in detection.

  1. Specify circumstances when escalation to a full formal investigation

The decision as to whether to escalate the situation to management will depend on any indications that a major business impact is likely or that a full investigation may be required where digital evidence may be needed.

  1. Train staff so that all those involved understand their role in the digital evidence process and evidence’s legal sensitivities.

This step aims to ensure that appropriate training is developed to prepare staff for various roles. It is also necessary to ensure that staff is competent to perform any roles related to the handling and preserving evidence.

  1. Present an evidence-based case describing the incident and its impact.

The aim of an investigation is not just to find a culprit. An investigation has to provide answers to questions and demonstrate why those answers are credible.

  Remember! This is just a sample.

Save time and get your custom paper from our expert writers

 Get started in just 3 minutes
 Sit back relax and leave the writing to us
 Sources and citations are provided
 100% Plagiarism free
error: Content is protected !!
×
Hi, my name is Jenn 👋

In case you can’t find a sample example, our professional writers are ready to help you with writing your own paper. All you need to do is fill out a short form and submit an order

Check Out the Form
Need Help?
Dont be shy to ask