ch 1 & 3

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Maintaining ____ means you must form and sustain unbiased opinions of your cases.

objectivity

A secure storage container or cabinet should be made of ____ and include an internal cabinet lock or external padlock.

steel

____________________ involves obtaining and analyzing digital information for use as evidence in civil, criminal, or administrative cases.

Computer forensics

investigates data that can be retrieved from a computer's hard disk or other storage media

Computer forensics

specifies who has the legal right to initiate an investigation, who can take possession of evidence, and who can have access to evidence

Line of authority

the legal process of proving guilt or innocence in court

Litigation

To preserve the integrity of evidence data, your lab should function as an evidence locker or safe, making it a ____ or a secure storage safe.

secure facility

Corporations often follow the ____ doctrine, which is what happens when a civilian or corporate investigative agent delivers evidence to a law enforcement officer.

silver-platter

sworn statement of support of facts about or evidence of a crime that is submitted to a judge to request a search warrant before seizing evidence

Affidavit

allows legal counsel to use previous cases similar to the current one because the laws don't yet exist

Case law

organization that exchanges information about techniques related to computer investigations and security

HTCIA

involves selling sensitive or confidential company information to a competitor

Industrial espionage

yields information about how a perpetrator or an attacker gained access to a network

Network forensics

Based on the incident or crime, the complainant makes a(n) ____, an accusation or supposition of fact that a crime has been committed.

allegation

A ____ is where you conduct your investigations, store evidence, and do most of your work.

computer forensics lab

In a ____ case, a suspect is tried for a criminal offense, such as burglary, murder, or molestation.

criminal

It's the investigator's responsibility to write the affidavit, which must include ____ (evidence) that support the allegation to justify the warrant.

exhibits

The ____________________ to the U.S. Constitution (and each state's constitution) protects everyone's rights to be secure in their person, residence, and property from search and seizure.

fourth amendment

Published company policies provide a(n) ____ for a business to conduct internal investigations.

line of authority

Most computer investigations in the private sector involve ____.

misuse of computing assets

The affidavit must be ____ under sworn oath to verify that the information in the affidavit is true.

notarized

In a criminal or public case, if you have enough information to support a search warrant, the prosecuting attorney might direct you to submit a(n) ____.

affidavit

Your ____ as a computer investigation and forensics analyst is critical because it determines your credibility.

professional conduct

In general, a criminal case follows three stages: the complaint, the investigation, and the ____.

prosecution


Set pelajaran terkait

ECPI 2020: NUR 164 CHAPTER 3 HEALTH WELLNESS AND HEALTH DISPARITIES

View Set

Chapter 8: Everyday Memory and Memory Errors

View Set

Chapter 11 Security and Personnel - Study Material

View Set

NEW network admin midterm part 2

View Set