Question

In: Computer Science

1. What is the "traditional" method for computer search and seizure, and what is the reasoning...

1. What is the "traditional" method for computer search and seizure, and what is the reasoning for this method?

2. Why does the paper advocate collecting volatile data before shutting down a computer? What is the single greatest factor leading to the need to collect this type of data? Why?

3. Does collecting volatile data make changes to the system? If so, why is it still permissible?

4. Is a new search warrant required to collect volatile data? Why or why not?

Solutions

Expert Solution

1. As information and communications technologies have entered everyday life, computer-related crime has dramatically increased. As computers or other data storage devices can provide the means of committing a crime or be a repository of electronic information that is evidence of a crime, the use of warrants to search for and seize such devices is given more and more importance.

Search and seizure is a procedure used in many civil law and common law legal systems by which police or other authorities and their agents, who, suspecting that a crime has been committed, commence a search of a person's property and confiscate any relevant evidence found in connection to the crime.

2  This type of data is called “volatile data” because it simply goes away and is irretrievable when the computer is off. 6 Volatile data stored in the RAM can contain information of interest to the investigator.

Volatile data is the data that is usually stored in cache memory or RAM. This volatile data is not permanent this is temporary and this data can be lost if the power is lost i.e., when computer looses its connection.

During any cyber crime attack, investigation process is held in this process data collection plays an important role but if the data is volatile then such type of data should be collected immediately. Volatile information can be collected remotely or onsite. If there are many number of systems to be collected then remotely is preferred rather than onsite

3.Volatile Data is not permanent; it is lost when power is removed from the memory. During an investigation, volatile data can contain critical information that would be lost if not collected at first. Historically, there was a “pull the plug” mentality when responding to an incident, but that is not the case any more

This volatile data may contain crucial information.so this data is to be collected as soon as possible. This process is known “Live Forensics”.
This may include several steps they are:

  1. Initially create response tool kit.
  2. Storing in this information which is obtained during initial response.
  3. Then obtain volatile data
  4. Then after that performing in in-depth live response.

4 Admissibility of Evidence There are a number of requirements for evidence to be ... the applicable search warrant, but first responders should cordon off and protect ... Data on disk Collecting volatile data presents a problem because doing so .

When we're performing incident response, the most volatile data should be collected first.


Related Solutions

1-Describe the historical development and the constitutional rules that govern evidence. 2-Explain what Search and Seizure...
1-Describe the historical development and the constitutional rules that govern evidence. 2-Explain what Search and Seizure is and what constitutional protections and limitations exist within our legal system. 3-Explain what privileged communication is and the different types in our legal system. 4-Explain what the difference is between a Lay Witness and an Expert Witness. 5-What is a Confession and an Admission, and what are the differences within the law? 6-What is written evidence and the legal requirements needed to present...
A binary search tree can be built with a traditional insertion method given a list of...
A binary search tree can be built with a traditional insertion method given a list of integers. Binary search trees (BSTs) are binary trees where the data is ordered such that nodes in the subtree to the left of a given node are smaller than or equal to the node, and the right subtree will contain nodes with values greater than the given node. With a built binary search tree, one can traverse the tree to print each node’s data...
A binary search tree can be built with a traditional insertion method given a list of...
A binary search tree can be built with a traditional insertion method given a list of integers. Binary search trees (BSTs) are binary trees where the data is ordered such that nodes in the subtree to the left of a given node are smaller than or equal to the node, and the right subtree will contain nodes with values greater than the given node. With a built binary search tree, one can traverse the tree to print each node’s data...
What are the different characteristics between a febrile seizure, and generalized seizure and an absence seizure?...
What are the different characteristics between a febrile seizure, and generalized seizure and an absence seizure? Name the three different causes of seizures, in children. Give an example of each. Name two common anticonvulsive medications and their side effects.
The issues in Search and Seizure without a Warrant revolve around the factors that make consent...
The issues in Search and Seizure without a Warrant revolve around the factors that make consent valid or invalid, as well as the nature of consent. Explain your choices in this scenario by addressing the following questions. What constitutes consent to a warrantless search, and who is able to consent? What happens in cases where consent might be somewhat ambiguous? Is there a reliable protocol police might employ to ensure that consent is valid? Explain your reasoning.
Circular Reasoning is one type of fallacy. Search for information about Circular Reasoning and locate several...
Circular Reasoning is one type of fallacy. Search for information about Circular Reasoning and locate several examples. Then complete the following: Post your definition (in your own words) of circular reasoning and include three (3) examples of circular reasoning you located during your search. In addition: Discuss times when you have encountered circular reasoning from someone and times when you used circular reasoning to defend your point-of-view and/or to convince someone of something. Provide at least three (3) examples of...
What is the operational definition of seizure?
What is the operational definition of seizure?
What is Determinant Search Method? Explain by using an example.
What is Determinant Search Method? Explain by using an example.
Q1 What is the difference between the linear variational method and more "traditional" variational method for...
Q1 What is the difference between the linear variational method and more "traditional" variational method for approximating eigenstate and energies. How does this affect the approach to minimize the variational energy? Q2 What are the Secular Equations? What is the Secular determinant? What is the difference? Does solving one affect the need to solve the other?
Description: The search method should prompt the user for a search phrase. Given the search phrase...
Description: The search method should prompt the user for a search phrase. Given the search phrase the search method should search each line in the file for the location of the phrase on each line. If the search phrase is not found on a line then just go to the next line. The search method must find every occurrence of the phrase on a line. The search method should print the line number, the line and the location of the...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT