Computer Forensics and Investigations
Chapter 5 - Processing Crime and Incident Scenes
Objectives
- Explain the rules for digital evidence
- Describe how to collect evidence at private-sector incident scenes
- Explain guidelines for processing law enforcement crime scenes
- List the steps in preparing for an evidence search
- Describe how to secure a computer incident or crime scene
- Explain guidelines for seizing digital evidence at the scene
- List procedures for storing digital evidence
- Explain how to obtain a digital hash
- Review a case to identify requirements and plan your investigation
Introduction
In this chapter you will learn how to process a computer investigation scene. Because this chapter focuses on investigation needs for computing systems, you should supplement your training by studying police science or U.S. Department of Justice (DOJ) procedures to understand field-of evidence recovery task. If you're in another country, be aware of the rules of evidence for your region and consult your local authorities
Instructions
- Read chapter 5
- Do Hands on Project 5-1 to 5-5
- Do Case Projects 5-1 to 5-5
- Do Review Questions 1 through 10 starting on page 20
Documents |
Additional Resources
|