SlideShare una empresa de Scribd logo
1 de 7
A digital forensic investigation process can involve many steps
and procedures. The objective is to obtain unbiased information
in a verifiable manner using accepted forensic practices. In this
project, you will perform some of the steps necessary for setting
up an investigation. These steps include designing interview
questions that establish the needs of the case and provide focus
for your investigative efforts. You will also determine what
resources may be needed to conduct the investigation. Once you
have this information, you will be able to develop an
investigation plan that properly sequences activities and
processes, allowing you to develop time estimates and
contingency plans should you encounter challenges in the
investigation.
This situation involves two computers and a thumb drive. After
clear authorization to proceed has been obtained, one of the first
investigative decision points is whether to process the items of
evidence individually or together. Processing computers
individually makes sense when they are not likely tied to the
same case. However, if the computers are linked to the same
case, there can be advantages in processing them together.
There are four steps in this project. In Step 1, you will develop
interview protocols and identify documentation needs for a
forensic investigation. In Step 2, you will identify tools and
software needed for the investigation. In Step 3, you will
develop a plan for conducting the investigation, and in Step 4,
you will consolidate your efforts in the form of a single
document to be submitted to your supervisor (i.e., your
instructor). The final assignment in this project is a planning
document with a title page, table of contents, and distinct
section for each of the three steps in the project. Consult the
relevant sections of
Guidelines for Project 1 Investigation Project Plan
in every step.
In Step 1, get started on the plan by creating an interview form
to record questions, key words, and authorization information,
and to complete the legal forms needed in this case. However,
before you can do that, you need to review your training in
criminal investigations.
Your tasks in Step 1 are to create interview forms to record
questions, key words, and authorization information, and to
designate other legal forms that will be needed in this case. It is
important for you to describe the importance of each form that
you create in the body of your final Project Plan assignment and
include in-text reference citations for all of your content. The
forms that you complete as part of Step 1 will be included in
your Investigation Project Plan, the final assignment for this
project.
As part of the investigation into two computers and a thumb
drive, it’s important to do the necessary preliminary work. In
criminal investigations
, there are laws governing
chain of custody
,
search warrants
,
subpoenas
,
jurisdiction
, and the
plain view doctrine
. It’s important to be familiar with these topics. Review
forensic laws and regulations
that relate to cybercrime, as well as
rules of digital forensics
in preparation for your digital forensic investigation.
The next thing to do is to read the police report and perform a
quick inventory of devices that are thought to contain
evidence
of the crime. You have set up a meeting with the lead
detectives and the prosecutor handling the case.
You have received an official request for assistance that
provides you with
authority
to conduct the investigation. You realize it will be impossible
to produce a
detailed investigation project plan
prior to your meeting with the detectives and the prosecutor.
First, you need to develop a series of questions to establish the
key people and activities. These questions should address
potential criminal activity, timelines, and people who need to be
investigated.
It is also important to determine whether different aspects of the
case are being pursued by other investigators and to include
those investigators on your contact list. In addition, some
situations may involve organizations or individuals who need to
adhere to various types of
industry compliance
. This situation may require you to follow special procedures.
In Step 2, you will consider the types of resources needed for
the investigation.
Step 2: List Required Forensic Equipment, Software, and Labor
Expenses
In Step 1, you developed forms and templates to collect the
legal, criminal, and technical information that lays the
groundwork for your investigation. In this step, you will
consider the types of equipment and human resources needed to
conduct the investigation and create a budget table that includes
expenses for software licenses, computers, storage devices,
number of digital forensics examiners, digital forensics
examiners’ labor hours, examiner hourly pay rate, including
time spent for each phase of the investigation process in
gathering evidence analysis, reporting, presentation preparation
and court appearance(s).
It is important to total overall costs of all equipment and
expenses in your budget table. By making these preparations,
you are establishing
forensic readiness
. Required resources can include people; tools and technologies
such as
RAID storage
,
deployment kits
, or
imaging programs
; and budget and timeline information.
Develop a checklist. It will be included in the final
Investigation Project Plan.
In the next step, you will begin to prepare a plan for managing a
digital forensic investigation.
Step 3: Plan Your Investigation
In the prior step, you determined what resources would be
necessary for your investigation. In this step, you will develop a
plan for managing the investigation. The requirements for
writing case reports
reflect the step-by-step rigidity of the criminal investigation
process itself. Being able to articulate time, task, money, and
personnel requirements is essential.
Project management
is a skill set that is not often linked to digital forensics and
criminal investigations. That is unfortunate because effective
project management can have a dramatic impact on the success
and accuracy of an investigation. Identifying the tasks that need
to be performed, their sequence, and their duration are
important considerations, especially in the face of "wild cards"
such as delays in obtaining correct search warrants and
subpoenas. It is also important to have a clear understanding of
the goals for the investigation as you will likely be called upon
to present conclusions and opinions of your findings.
Your project plan should include a properly sequenced narrative
timeline and a separately labeled and sequenced Visual Graphic
Timeline chart that reflects the time intervals between each
phase of the
evidence acquisition and investigation processes
(e.g., 30 hours gathering evidence spread across five business
days, 60 hours of analysis over 10 business days, 90 days for
reporting and court preparation, etc.) including detailed time
estimates, and contingency plans. Your plan will serve many
purposes, including the assignment of a project budget. As you
create your plan, be sure to include in your meeting agenda
communications and reporting: who should be involved, how
the activities should be carried out, how often, and under what
circumstances (i.e., modality, frequency).
Once you have developed your project management plan, move
on to the next step, where you will submit your final
assignment.
Step 4: Prepare and Submit Completed Investigation Project
Plan
For your final assignment, you will combine the results of the
previous three steps into a single planning document—an
Investigation Project Plan—with a title page, a table of
contents, and a distinct section for each of the three steps. The
plan should include:
Forms documenting key people, meeting agenda, key activities
and reporting, key words, investigation timeline narrative,
visual graphic timeline chart, authorization confirmation (e.g.,
ownership, jurisdiction), and related investigations. Designation
of the legal forms required for criminal investigations should
also be included. (Step 1)
Resource checklist for equipment, human resources and labor
expenses (Step 2)
Management plan (Step 3)
Search and seizure form(s)
Chain of custody form
The organization and details of your plan is important. Be sure
to refer to the
Guidelines for Project 1 Investigation Project Plan
to meet the minimum standards needed for this project.
All sources of information must be appropriately referenced.
Submit your completed Investigation Project Plan to your
supervisor (instructor) for evaluation upon completion.
A digital forensic investigation process can involve many steps and .docx

Más contenido relacionado

Similar a A digital forensic investigation process can involve many steps and .docx

Software project planning and monitoring
Software project planning and monitoringSoftware project planning and monitoring
Software project planning and monitoringYb Yar
 
raineygauntformal707
raineygauntformal707raineygauntformal707
raineygauntformal707Dionne Rainey
 
How to-run-a-successful-regulatory-compliance-project-1
How to-run-a-successful-regulatory-compliance-project-1How to-run-a-successful-regulatory-compliance-project-1
How to-run-a-successful-regulatory-compliance-project-1N N
 
Post Mortems: The Anatomy of Market Research Process Improvement
Post Mortems: The Anatomy of Market Research Process ImprovementPost Mortems: The Anatomy of Market Research Process Improvement
Post Mortems: The Anatomy of Market Research Process ImprovementKathryn Korostoff
 
Activities of project planning
Activities of  project planningActivities of  project planning
Activities of project planningPrakash Tyata
 
Week 1BSA 310 Material Week 1.docxSystem InventoryBSA310 V.docx
Week 1BSA 310 Material Week 1.docxSystem InventoryBSA310 V.docxWeek 1BSA 310 Material Week 1.docxSystem InventoryBSA310 V.docx
Week 1BSA 310 Material Week 1.docxSystem InventoryBSA310 V.docxmelbruce90096
 
Corporate Public Investigations
Corporate Public InvestigationsCorporate Public Investigations
Corporate Public InvestigationsCTIN
 
Bust These 4 Myths on Your Next Document Review
Bust These 4 Myths on Your Next Document ReviewBust These 4 Myths on Your Next Document Review
Bust These 4 Myths on Your Next Document ReviewLogikcull.com
 
9. Project Design and Documentation.pptx
9. Project Design and Documentation.pptx9. Project Design and Documentation.pptx
9. Project Design and Documentation.pptxalizakashaf8
 
Malware analysis
Malware analysisMalware analysis
Malware analysisAnne ndolo
 
Computer Forensics MethodologiesList them and explain each one.P.pdf
Computer Forensics MethodologiesList them and explain each one.P.pdfComputer Forensics MethodologiesList them and explain each one.P.pdf
Computer Forensics MethodologiesList them and explain each one.P.pdffeetshoemart
 
about start up for you 12
about start up for you 12about start up for you 12
about start up for you 12aliaalistartup
 
Instructions Need task completed for Ds portion of the pr.docx
Instructions Need task completed for Ds portion of the pr.docxInstructions Need task completed for Ds portion of the pr.docx
Instructions Need task completed for Ds portion of the pr.docxnormanibarber20063
 
SDPM (Success Driven Project Management)
SDPM (Success Driven Project Management)SDPM (Success Driven Project Management)
SDPM (Success Driven Project Management)Peter Mello
 
Need help with below, apa format , due may 3rd , no plagrism, must c.docx
Need help with below, apa format , due may 3rd , no plagrism, must c.docxNeed help with below, apa format , due may 3rd , no plagrism, must c.docx
Need help with below, apa format , due may 3rd , no plagrism, must c.docxtaitcandie
 
subject.....project management.Tools and Processes Based on the pr.pdf
subject.....project management.Tools and Processes Based on the pr.pdfsubject.....project management.Tools and Processes Based on the pr.pdf
subject.....project management.Tools and Processes Based on the pr.pdfSALES97
 
Proyecto integrador iii_interactive_activity (1)
Proyecto integrador iii_interactive_activity (1)Proyecto integrador iii_interactive_activity (1)
Proyecto integrador iii_interactive_activity (1)Cintia Cuzme Placencia
 
OCR Audits Are Coming – Is Your Organization Prepared?
OCR Audits Are Coming – Is Your Organization Prepared?OCR Audits Are Coming – Is Your Organization Prepared?
OCR Audits Are Coming – Is Your Organization Prepared?Polsinelli PC
 

Similar a A digital forensic investigation process can involve many steps and .docx (20)

Software project planning and monitoring
Software project planning and monitoringSoftware project planning and monitoring
Software project planning and monitoring
 
raineygauntformal707
raineygauntformal707raineygauntformal707
raineygauntformal707
 
How to-run-a-successful-regulatory-compliance-project-1
How to-run-a-successful-regulatory-compliance-project-1How to-run-a-successful-regulatory-compliance-project-1
How to-run-a-successful-regulatory-compliance-project-1
 
Post Mortems: The Anatomy of Market Research Process Improvement
Post Mortems: The Anatomy of Market Research Process ImprovementPost Mortems: The Anatomy of Market Research Process Improvement
Post Mortems: The Anatomy of Market Research Process Improvement
 
Activities of project planning
Activities of  project planningActivities of  project planning
Activities of project planning
 
Week 1BSA 310 Material Week 1.docxSystem InventoryBSA310 V.docx
Week 1BSA 310 Material Week 1.docxSystem InventoryBSA310 V.docxWeek 1BSA 310 Material Week 1.docxSystem InventoryBSA310 V.docx
Week 1BSA 310 Material Week 1.docxSystem InventoryBSA310 V.docx
 
Corporate Public Investigations
Corporate Public InvestigationsCorporate Public Investigations
Corporate Public Investigations
 
Bust These 4 Myths on Your Next Document Review
Bust These 4 Myths on Your Next Document ReviewBust These 4 Myths on Your Next Document Review
Bust These 4 Myths on Your Next Document Review
 
9. Project Design and Documentation.pptx
9. Project Design and Documentation.pptx9. Project Design and Documentation.pptx
9. Project Design and Documentation.pptx
 
Malware analysis
Malware analysisMalware analysis
Malware analysis
 
Computer Forensics MethodologiesList them and explain each one.P.pdf
Computer Forensics MethodologiesList them and explain each one.P.pdfComputer Forensics MethodologiesList them and explain each one.P.pdf
Computer Forensics MethodologiesList them and explain each one.P.pdf
 
about start up for you 12
about start up for you 12about start up for you 12
about start up for you 12
 
Instructions Need task completed for Ds portion of the pr.docx
Instructions Need task completed for Ds portion of the pr.docxInstructions Need task completed for Ds portion of the pr.docx
Instructions Need task completed for Ds portion of the pr.docx
 
SDPM (Success Driven Project Management)
SDPM (Success Driven Project Management)SDPM (Success Driven Project Management)
SDPM (Success Driven Project Management)
 
PERT
PERTPERT
PERT
 
Unit 2
Unit 2Unit 2
Unit 2
 
Need help with below, apa format , due may 3rd , no plagrism, must c.docx
Need help with below, apa format , due may 3rd , no plagrism, must c.docxNeed help with below, apa format , due may 3rd , no plagrism, must c.docx
Need help with below, apa format , due may 3rd , no plagrism, must c.docx
 
subject.....project management.Tools and Processes Based on the pr.pdf
subject.....project management.Tools and Processes Based on the pr.pdfsubject.....project management.Tools and Processes Based on the pr.pdf
subject.....project management.Tools and Processes Based on the pr.pdf
 
Proyecto integrador iii_interactive_activity (1)
Proyecto integrador iii_interactive_activity (1)Proyecto integrador iii_interactive_activity (1)
Proyecto integrador iii_interactive_activity (1)
 
OCR Audits Are Coming – Is Your Organization Prepared?
OCR Audits Are Coming – Is Your Organization Prepared?OCR Audits Are Coming – Is Your Organization Prepared?
OCR Audits Are Coming – Is Your Organization Prepared?
 

Más de makdul

According to Davenport (2014) social media and health care are c.docx
According to Davenport (2014) social media and health care are c.docxAccording to Davenport (2014) social media and health care are c.docx
According to Davenport (2014) social media and health care are c.docxmakdul
 
According to (Fatehi, Gordon & Florida, N.D.) theoretical orient.docx
According to (Fatehi, Gordon & Florida, N.D.) theoretical orient.docxAccording to (Fatehi, Gordon & Florida, N.D.) theoretical orient.docx
According to (Fatehi, Gordon & Florida, N.D.) theoretical orient.docxmakdul
 
According to Libertarianism, there is no right to any social service.docx
According to Libertarianism, there is no right to any social service.docxAccording to Libertarianism, there is no right to any social service.docx
According to Libertarianism, there is no right to any social service.docxmakdul
 
According to Kirk (2016), most of your time will be spent working wi.docx
According to Kirk (2016), most of your time will be spent working wi.docxAccording to Kirk (2016), most of your time will be spent working wi.docx
According to Kirk (2016), most of your time will be spent working wi.docxmakdul
 
According to cultural deviance theorists like Cohen, deviant sub.docx
According to cultural deviance theorists like Cohen, deviant sub.docxAccording to cultural deviance theorists like Cohen, deviant sub.docx
According to cultural deviance theorists like Cohen, deviant sub.docxmakdul
 
According to Gray et al, (2017) critical appraisal is the proce.docx
According to Gray et al, (2017) critical appraisal is the proce.docxAccording to Gray et al, (2017) critical appraisal is the proce.docx
According to Gray et al, (2017) critical appraisal is the proce.docxmakdul
 
According to article Insecure Policing Under Racial Capitalism by.docx
According to article Insecure Policing Under Racial Capitalism by.docxAccording to article Insecure Policing Under Racial Capitalism by.docx
According to article Insecure Policing Under Racial Capitalism by.docxmakdul
 
Abstract In this experiment, examining the equivalence poi.docx
Abstract  In this experiment, examining the equivalence poi.docxAbstract  In this experiment, examining the equivalence poi.docx
Abstract In this experiment, examining the equivalence poi.docxmakdul
 
ACC 403- ASSIGNMENT 2 RUBRIC!!!Points 280Assignment 2 Audi.docx
ACC 403- ASSIGNMENT 2 RUBRIC!!!Points 280Assignment 2 Audi.docxACC 403- ASSIGNMENT 2 RUBRIC!!!Points 280Assignment 2 Audi.docx
ACC 403- ASSIGNMENT 2 RUBRIC!!!Points 280Assignment 2 Audi.docxmakdul
 
ACC 601 Managerial Accounting Group Case 3 (160 points) .docx
ACC 601 Managerial Accounting Group Case 3 (160 points) .docxACC 601 Managerial Accounting Group Case 3 (160 points) .docx
ACC 601 Managerial Accounting Group Case 3 (160 points) .docxmakdul
 
Academic Integrity A Letter to My Students[1] Bill T.docx
Academic Integrity A Letter to My Students[1]  Bill T.docxAcademic Integrity A Letter to My Students[1]  Bill T.docx
Academic Integrity A Letter to My Students[1] Bill T.docxmakdul
 
Access the Center for Disease Control and Prevention’s (CDC’s) Nu.docx
Access the Center for Disease Control and Prevention’s (CDC’s) Nu.docxAccess the Center for Disease Control and Prevention’s (CDC’s) Nu.docx
Access the Center for Disease Control and Prevention’s (CDC’s) Nu.docxmakdul
 
According to DSM 5 This patient had very many symptoms that sugg.docx
According to DSM 5 This patient had very many symptoms that sugg.docxAccording to DSM 5 This patient had very many symptoms that sugg.docx
According to DSM 5 This patient had very many symptoms that sugg.docxmakdul
 
Acceptable concerts include professional orchestras, soloists, jazz,.docx
Acceptable concerts include professional orchestras, soloists, jazz,.docxAcceptable concerts include professional orchestras, soloists, jazz,.docx
Acceptable concerts include professional orchestras, soloists, jazz,.docxmakdul
 
ACA was passed in 2010, under the presidency of Barack Obama. Pr.docx
ACA was passed in 2010, under the presidency of Barack Obama. Pr.docxACA was passed in 2010, under the presidency of Barack Obama. Pr.docx
ACA was passed in 2010, under the presidency of Barack Obama. Pr.docxmakdul
 
Access the FASB website. Once you login, click the FASB Accounting S.docx
Access the FASB website. Once you login, click the FASB Accounting S.docxAccess the FASB website. Once you login, click the FASB Accounting S.docx
Access the FASB website. Once you login, click the FASB Accounting S.docxmakdul
 
Academic Paper  Overview  This performance task was intended to asse.docx
Academic Paper  Overview  This performance task was intended to asse.docxAcademic Paper  Overview  This performance task was intended to asse.docx
Academic Paper  Overview  This performance task was intended to asse.docxmakdul
 
Academic Research Team Project PaperCOVID-19 Open Research Datas.docx
Academic Research Team Project PaperCOVID-19 Open Research Datas.docxAcademic Research Team Project PaperCOVID-19 Open Research Datas.docx
Academic Research Team Project PaperCOVID-19 Open Research Datas.docxmakdul
 
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxAbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxmakdul
 
Abstract                                 Structure of Abstra.docx
Abstract                                 Structure of Abstra.docxAbstract                                 Structure of Abstra.docx
Abstract                                 Structure of Abstra.docxmakdul
 

Más de makdul (20)

According to Davenport (2014) social media and health care are c.docx
According to Davenport (2014) social media and health care are c.docxAccording to Davenport (2014) social media and health care are c.docx
According to Davenport (2014) social media and health care are c.docx
 
According to (Fatehi, Gordon & Florida, N.D.) theoretical orient.docx
According to (Fatehi, Gordon & Florida, N.D.) theoretical orient.docxAccording to (Fatehi, Gordon & Florida, N.D.) theoretical orient.docx
According to (Fatehi, Gordon & Florida, N.D.) theoretical orient.docx
 
According to Libertarianism, there is no right to any social service.docx
According to Libertarianism, there is no right to any social service.docxAccording to Libertarianism, there is no right to any social service.docx
According to Libertarianism, there is no right to any social service.docx
 
According to Kirk (2016), most of your time will be spent working wi.docx
According to Kirk (2016), most of your time will be spent working wi.docxAccording to Kirk (2016), most of your time will be spent working wi.docx
According to Kirk (2016), most of your time will be spent working wi.docx
 
According to cultural deviance theorists like Cohen, deviant sub.docx
According to cultural deviance theorists like Cohen, deviant sub.docxAccording to cultural deviance theorists like Cohen, deviant sub.docx
According to cultural deviance theorists like Cohen, deviant sub.docx
 
According to Gray et al, (2017) critical appraisal is the proce.docx
According to Gray et al, (2017) critical appraisal is the proce.docxAccording to Gray et al, (2017) critical appraisal is the proce.docx
According to Gray et al, (2017) critical appraisal is the proce.docx
 
According to article Insecure Policing Under Racial Capitalism by.docx
According to article Insecure Policing Under Racial Capitalism by.docxAccording to article Insecure Policing Under Racial Capitalism by.docx
According to article Insecure Policing Under Racial Capitalism by.docx
 
Abstract In this experiment, examining the equivalence poi.docx
Abstract  In this experiment, examining the equivalence poi.docxAbstract  In this experiment, examining the equivalence poi.docx
Abstract In this experiment, examining the equivalence poi.docx
 
ACC 403- ASSIGNMENT 2 RUBRIC!!!Points 280Assignment 2 Audi.docx
ACC 403- ASSIGNMENT 2 RUBRIC!!!Points 280Assignment 2 Audi.docxACC 403- ASSIGNMENT 2 RUBRIC!!!Points 280Assignment 2 Audi.docx
ACC 403- ASSIGNMENT 2 RUBRIC!!!Points 280Assignment 2 Audi.docx
 
ACC 601 Managerial Accounting Group Case 3 (160 points) .docx
ACC 601 Managerial Accounting Group Case 3 (160 points) .docxACC 601 Managerial Accounting Group Case 3 (160 points) .docx
ACC 601 Managerial Accounting Group Case 3 (160 points) .docx
 
Academic Integrity A Letter to My Students[1] Bill T.docx
Academic Integrity A Letter to My Students[1]  Bill T.docxAcademic Integrity A Letter to My Students[1]  Bill T.docx
Academic Integrity A Letter to My Students[1] Bill T.docx
 
Access the Center for Disease Control and Prevention’s (CDC’s) Nu.docx
Access the Center for Disease Control and Prevention’s (CDC’s) Nu.docxAccess the Center for Disease Control and Prevention’s (CDC’s) Nu.docx
Access the Center for Disease Control and Prevention’s (CDC’s) Nu.docx
 
According to DSM 5 This patient had very many symptoms that sugg.docx
According to DSM 5 This patient had very many symptoms that sugg.docxAccording to DSM 5 This patient had very many symptoms that sugg.docx
According to DSM 5 This patient had very many symptoms that sugg.docx
 
Acceptable concerts include professional orchestras, soloists, jazz,.docx
Acceptable concerts include professional orchestras, soloists, jazz,.docxAcceptable concerts include professional orchestras, soloists, jazz,.docx
Acceptable concerts include professional orchestras, soloists, jazz,.docx
 
ACA was passed in 2010, under the presidency of Barack Obama. Pr.docx
ACA was passed in 2010, under the presidency of Barack Obama. Pr.docxACA was passed in 2010, under the presidency of Barack Obama. Pr.docx
ACA was passed in 2010, under the presidency of Barack Obama. Pr.docx
 
Access the FASB website. Once you login, click the FASB Accounting S.docx
Access the FASB website. Once you login, click the FASB Accounting S.docxAccess the FASB website. Once you login, click the FASB Accounting S.docx
Access the FASB website. Once you login, click the FASB Accounting S.docx
 
Academic Paper  Overview  This performance task was intended to asse.docx
Academic Paper  Overview  This performance task was intended to asse.docxAcademic Paper  Overview  This performance task was intended to asse.docx
Academic Paper  Overview  This performance task was intended to asse.docx
 
Academic Research Team Project PaperCOVID-19 Open Research Datas.docx
Academic Research Team Project PaperCOVID-19 Open Research Datas.docxAcademic Research Team Project PaperCOVID-19 Open Research Datas.docx
Academic Research Team Project PaperCOVID-19 Open Research Datas.docx
 
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxAbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
 
Abstract                                 Structure of Abstra.docx
Abstract                                 Structure of Abstra.docxAbstract                                 Structure of Abstra.docx
Abstract                                 Structure of Abstra.docx
 

Último

Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptxPoojaSen20
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 

Último (20)

Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptx
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 

A digital forensic investigation process can involve many steps and .docx

  • 1. A digital forensic investigation process can involve many steps and procedures. The objective is to obtain unbiased information in a verifiable manner using accepted forensic practices. In this project, you will perform some of the steps necessary for setting up an investigation. These steps include designing interview questions that establish the needs of the case and provide focus for your investigative efforts. You will also determine what resources may be needed to conduct the investigation. Once you have this information, you will be able to develop an investigation plan that properly sequences activities and processes, allowing you to develop time estimates and contingency plans should you encounter challenges in the investigation. This situation involves two computers and a thumb drive. After clear authorization to proceed has been obtained, one of the first investigative decision points is whether to process the items of evidence individually or together. Processing computers individually makes sense when they are not likely tied to the same case. However, if the computers are linked to the same case, there can be advantages in processing them together. There are four steps in this project. In Step 1, you will develop interview protocols and identify documentation needs for a forensic investigation. In Step 2, you will identify tools and software needed for the investigation. In Step 3, you will develop a plan for conducting the investigation, and in Step 4, you will consolidate your efforts in the form of a single document to be submitted to your supervisor (i.e., your instructor). The final assignment in this project is a planning document with a title page, table of contents, and distinct section for each of the three steps in the project. Consult the relevant sections of Guidelines for Project 1 Investigation Project Plan in every step.
  • 2. In Step 1, get started on the plan by creating an interview form to record questions, key words, and authorization information, and to complete the legal forms needed in this case. However, before you can do that, you need to review your training in criminal investigations. Your tasks in Step 1 are to create interview forms to record questions, key words, and authorization information, and to designate other legal forms that will be needed in this case. It is important for you to describe the importance of each form that you create in the body of your final Project Plan assignment and include in-text reference citations for all of your content. The forms that you complete as part of Step 1 will be included in your Investigation Project Plan, the final assignment for this project. As part of the investigation into two computers and a thumb drive, it’s important to do the necessary preliminary work. In criminal investigations , there are laws governing chain of custody , search warrants , subpoenas , jurisdiction , and the plain view doctrine . It’s important to be familiar with these topics. Review forensic laws and regulations that relate to cybercrime, as well as rules of digital forensics in preparation for your digital forensic investigation.
  • 3. The next thing to do is to read the police report and perform a quick inventory of devices that are thought to contain evidence of the crime. You have set up a meeting with the lead detectives and the prosecutor handling the case. You have received an official request for assistance that provides you with authority to conduct the investigation. You realize it will be impossible to produce a detailed investigation project plan prior to your meeting with the detectives and the prosecutor. First, you need to develop a series of questions to establish the key people and activities. These questions should address potential criminal activity, timelines, and people who need to be investigated. It is also important to determine whether different aspects of the case are being pursued by other investigators and to include those investigators on your contact list. In addition, some situations may involve organizations or individuals who need to adhere to various types of industry compliance . This situation may require you to follow special procedures. In Step 2, you will consider the types of resources needed for the investigation. Step 2: List Required Forensic Equipment, Software, and Labor Expenses In Step 1, you developed forms and templates to collect the legal, criminal, and technical information that lays the groundwork for your investigation. In this step, you will
  • 4. consider the types of equipment and human resources needed to conduct the investigation and create a budget table that includes expenses for software licenses, computers, storage devices, number of digital forensics examiners, digital forensics examiners’ labor hours, examiner hourly pay rate, including time spent for each phase of the investigation process in gathering evidence analysis, reporting, presentation preparation and court appearance(s). It is important to total overall costs of all equipment and expenses in your budget table. By making these preparations, you are establishing forensic readiness . Required resources can include people; tools and technologies such as RAID storage , deployment kits , or imaging programs ; and budget and timeline information. Develop a checklist. It will be included in the final Investigation Project Plan. In the next step, you will begin to prepare a plan for managing a digital forensic investigation. Step 3: Plan Your Investigation In the prior step, you determined what resources would be necessary for your investigation. In this step, you will develop a plan for managing the investigation. The requirements for writing case reports reflect the step-by-step rigidity of the criminal investigation process itself. Being able to articulate time, task, money, and
  • 5. personnel requirements is essential. Project management is a skill set that is not often linked to digital forensics and criminal investigations. That is unfortunate because effective project management can have a dramatic impact on the success and accuracy of an investigation. Identifying the tasks that need to be performed, their sequence, and their duration are important considerations, especially in the face of "wild cards" such as delays in obtaining correct search warrants and subpoenas. It is also important to have a clear understanding of the goals for the investigation as you will likely be called upon to present conclusions and opinions of your findings. Your project plan should include a properly sequenced narrative timeline and a separately labeled and sequenced Visual Graphic Timeline chart that reflects the time intervals between each phase of the evidence acquisition and investigation processes (e.g., 30 hours gathering evidence spread across five business days, 60 hours of analysis over 10 business days, 90 days for reporting and court preparation, etc.) including detailed time estimates, and contingency plans. Your plan will serve many purposes, including the assignment of a project budget. As you create your plan, be sure to include in your meeting agenda communications and reporting: who should be involved, how the activities should be carried out, how often, and under what circumstances (i.e., modality, frequency). Once you have developed your project management plan, move on to the next step, where you will submit your final assignment. Step 4: Prepare and Submit Completed Investigation Project Plan
  • 6. For your final assignment, you will combine the results of the previous three steps into a single planning document—an Investigation Project Plan—with a title page, a table of contents, and a distinct section for each of the three steps. The plan should include: Forms documenting key people, meeting agenda, key activities and reporting, key words, investigation timeline narrative, visual graphic timeline chart, authorization confirmation (e.g., ownership, jurisdiction), and related investigations. Designation of the legal forms required for criminal investigations should also be included. (Step 1) Resource checklist for equipment, human resources and labor expenses (Step 2) Management plan (Step 3) Search and seizure form(s) Chain of custody form The organization and details of your plan is important. Be sure to refer to the Guidelines for Project 1 Investigation Project Plan to meet the minimum standards needed for this project. All sources of information must be appropriately referenced. Submit your completed Investigation Project Plan to your supervisor (instructor) for evaluation upon completion.