ch 1 & 3
Maintaining ____ means you must form and sustain unbiased opinions of your cases.
objectivity
A secure storage container or cabinet should be made of ____ and include an internal cabinet lock or external padlock.
steel
____________________ involves obtaining and analyzing digital information for use as evidence in civil, criminal, or administrative cases.
Computer forensics
investigates data that can be retrieved from a computer's hard disk or other storage media
Computer forensics
specifies who has the legal right to initiate an investigation, who can take possession of evidence, and who can have access to evidence
Line of authority
the legal process of proving guilt or innocence in court
Litigation
To preserve the integrity of evidence data, your lab should function as an evidence locker or safe, making it a ____ or a secure storage safe.
secure facility
Corporations often follow the ____ doctrine, which is what happens when a civilian or corporate investigative agent delivers evidence to a law enforcement officer.
silver-platter
sworn statement of support of facts about or evidence of a crime that is submitted to a judge to request a search warrant before seizing evidence
Affidavit
allows legal counsel to use previous cases similar to the current one because the laws don't yet exist
Case law
organization that exchanges information about techniques related to computer investigations and security
HTCIA
involves selling sensitive or confidential company information to a competitor
Industrial espionage
yields information about how a perpetrator or an attacker gained access to a network
Network forensics
Based on the incident or crime, the complainant makes a(n) ____, an accusation or supposition of fact that a crime has been committed.
allegation
A ____ is where you conduct your investigations, store evidence, and do most of your work.
computer forensics lab
In a ____ case, a suspect is tried for a criminal offense, such as burglary, murder, or molestation.
criminal
It's the investigator's responsibility to write the affidavit, which must include ____ (evidence) that support the allegation to justify the warrant.
exhibits
The ____________________ to the U.S. Constitution (and each state's constitution) protects everyone's rights to be secure in their person, residence, and property from search and seizure.
fourth amendment
Published company policies provide a(n) ____ for a business to conduct internal investigations.
line of authority
Most computer investigations in the private sector involve ____.
misuse of computing assets
The affidavit must be ____ under sworn oath to verify that the information in the affidavit is true.
notarized
In a criminal or public case, if you have enough information to support a search warrant, the prosecuting attorney might direct you to submit a(n) ____.
affidavit
Your ____ as a computer investigation and forensics analyst is critical because it determines your credibility.
professional conduct
In general, a criminal case follows three stages: the complaint, the investigation, and the ____.
prosecution