Computer Forensics Chapter 1
The affidavit must be ____ under sworn oath to verify that the information in the affidavit is true.
Notarized
In a criminal or public case, if you have enough information to support a search warrant, the prosecuting attorney might direct you to submit a(n) ____.
affidavit
A(n) ____ is a person using a computer to perform routine tasks other than systems administration.
end user
Maintaining ____ means you must form and sustain unbiased opinions of your cases.
objectivity
The ____ group manages investigations and conducts forensic analysis of systems suspected of containing evidence related to an incident or a crime.
Computer Investigations
Published company policies provide a(n) ____ for a business to conduct internal investigations.
Line of Authority
In general, a criminal case follows three stages: the complaint, the investigation, and the ____.
Prosecution
Without a warning banner, employees might have an assumed ____ when using a company's computer systems and network accesses.
Right of Privacy
Corporations often follow the ____ doctrine, which is what happens when a civilian or corporate investigative agent delivers evidence to a law enforcement officer.
Silver-Platter
____ involves recovering information from a computer that was deleted by mistake or lost during a power surge or server crash, for example.
data recovery