Question

In: Computer Science

Assignment # 6: Chain of Custody Roles and Requirements Learning Objectives and Outcomes Describe the requirements...

Assignment # 6: Chain of Custody Roles and Requirements

Learning Objectives and Outcomes

  • Describe the requirements of a chain of custody.
  • Differentiate the roles of people involved in evidence seizure and handling.

Assignment Requirements

You are a digital forensics intern at Azorian Computer Forensics, a privately owned forensics investigations and data recovery firm in the Denver, Colorado area. Azorian has been called to a client’s site to work on a security incident involving five laptop computers. You are assisting Pat, one of Azorian's lead investigators. Pat is working with the client's IT security staff team leader, Marta, and an IT staff member, Suhkrit, to seize and process the five computers. Marta is overseeing the process, whereas Suhkrit is directly involved in handling the computers.

The computers must be removed from the employees' work areas and moved to a secure location within the client's premises. From there, you will assist Pat in preparing the computers for transporting them to the Azorian facility.

BACKGROUND

Chain of Custody

Evidence is always in the custody of someone or in secure storage. The chain of custody form documents who has the evidence in their possession at any given time. Whenever evidence is transferred from one person to another or one place to another, the chain of custody must be updated.

A chain of custody document shows:

  • What was collected (description, serial numbers, and so on)
  • Who obtained the evidence
  • Where and when it was obtained
  • Who secured it
  • Who had control or possession of it

The chain of custody requires that every transfer of evidence be provable that nobody else could have accessed that evidence. It is best to keep the number of transfers as low as possible.

Chain of Custody Form

Fields in a chain of custody form may include the following:

  • Case
  • Reason of evidence obtained
  • Name
  • Title
  • Address from person received
  • Location obtained from
  • Date/time obtained
  • Item number
  • Quantity
  • Description

For each evidence item, include the following information:

  • Item number
  • Date
  • Released by (signature, name, title)
  • Received by (signature, name, title)
  • Purpose of chain of custody

For this assignment:

  1. Walk through the process of removal of computers from employees’ work areas to the client's secure location and eventually to the Azorian facility. Who might have possession of the computers during each step? Sketch a rough diagram or flow chart of the process.
  2. Each transfer of possession requires chain of custody documentation. Each transfer requires a signature from the person releasing the evidence and the person receiving the evidence. Include the from/to information in your diagram or flow chart.

Solutions

Expert Solution



Related Solutions

Policy Implementation Steps Learning Objectives and Outcomes  Explain proper policy implementation steps and describe factors...
Policy Implementation Steps Learning Objectives and Outcomes  Explain proper policy implementation steps and describe factors relating to its success. Scenario Two health care organizations have recently merged. The parent organization is a large medical clinic that is HIPAA compliant. The clinic recently acquired a remote medical clinic that provides a specialty service. The remote clinic is organized in a flat structure, but the parent organization is organized in a hierarchical structure with many departments and medical clinics. These organizations...
The Assignment`s learning Outcomes: In the second assignment for the Quality Management course, the students are...
The Assignment`s learning Outcomes: In the second assignment for the Quality Management course, the students are required to read the “ Nestlé Waters Unifying real-time visibility across 26 factories” case study , and answer the related questions, upon successful completion of the assignment the student should be able to: 1. Implement the business-integrated quality systems through process control (LO: 2.7 & 2.8). 2. Use quality improvement tools and practices for continuous improvement. (LO: 3.5 & 3.8). 3. Develop strategies for...
Discussion Learning Objectives and Outcomes You will learn the phases of incident response and the team...
Discussion Learning Objectives and Outcomes You will learn the phases of incident response and the team members involved who respond to incidents. Discussion Requirements You are provided a handout that describes a scenario in which an incident occurred along with corrective actions taken. The handout also includes a description of the phases of information security incident response. Tasks Discuss the phases of a typical information security incident response. Using the information presented in the handout, discuss the following questions: What...
please I want new answer The Assignment`s learning Outcomes: In the second assignment for the Quality...
please I want new answer The Assignment`s learning Outcomes: In the second assignment for the Quality Management course, the students are required to read the “ Nestlé Waters Unifying real-time visibility across 26 factories” case study , and answer the related questions, upon successful completion of the assignment the student should be able to: 1. Implement the business-integrated quality systems through process control (LO: 2.7 & 2.8). 2. Use quality improvement tools and practices for continuous improvement. (LO: 3.5 &...
Assign 07 - Linux Forensics Learning Objectives and Outcomes Research information about Linux forensic investigations and...
Assign 07 - Linux Forensics Learning Objectives and Outcomes Research information about Linux forensic investigations and appropriate tools. Identify and describe three Web sites that provide highly relevant information to Linux forensic investigations. Assignment Requirements You are an experienced digital forensics specialist for DigiFirm Investigation Company. DigiFirm is involved in an investigation of a large corporation accused of unauthorized access of a competitor’s database to obtain customer information. The DigiFirm team will be responsible for the forensic investigation of the...
This assignment covers practical aspects of this course. This assessment covers the following course learning outcomes:...
This assignment covers practical aspects of this course. This assessment covers the following course learning outcomes: CLO 2 - Apply programming concepts to computing problems CLO 3 - Examine Code for its syntax and semantic validity Case Study The assignment is based on the monthly income of Anna, a coffee shop owner in Suva. Anna’s monthly income for 2019 is given below, and you are required to write a program that will perform some manipulation actions on her monthly income...
E4-25B. (Learning Objectives 1, 2: Describe fraud and its impact; Explain the objectives and components of...
E4-25B. (Learning Objectives 1, 2: Describe fraud and its impact; Explain the objectives and components of internal control) Identify the internal control weakness in the following situations. State how the person can hurt the company. a. Mandy Morrison works as a security guard at POST parking in Oklahoma City. Morrison has a master key to the cash box where customers pay for parking. Each night Morrison prepares the cash report that shows (a) the number of cars that parked on...
Assignment Objectives & Requirements: 1.To create a new E-commerce business, which is located in the Kingdom...
Assignment Objectives & Requirements: 1.To create a new E-commerce business, which is located in the Kingdom of Saudi Arabia,which include the followings: a.Introduction about your business. b.Product and type of services. c.Business statement. d.Business vision. e.Business objective. 2.To explain your business E-commerce processes. 3.To apply a SWOT analysis to your business. 4.Building the E-commerce website. a.How it will look likes in terms of design and format (draft). 5.Student is required to explain its E-commerce system functionality, such as: a.The product...
Quantitative Methods II This assignment relates to the following Course Learning Requirements: [CLR 1] Calculate the...
Quantitative Methods II This assignment relates to the following Course Learning Requirements: [CLR 1] Calculate the chance that some specific event will occur at some future time • knowledge of the normal probability distribution [CLR 2] Perform Sampling Distribution and Estimation [CLR 3] Conduct Hypothesis Testing [CLR 4] Understand and calculate Regression and Correlation Objective of this Assignment:    To conduct a regression and correlation analysis Instructions: The term paper involves conducting a regression and correlation analysis on any topic of...
Learning Objectives 4, 5, 6: Analyze the impact of business transactions on accounts; record (journalize and...
Learning Objectives 4, 5, 6: Analyze the impact of business transactions on accounts; record (journalize and post) transactions in the books; construct and use a trial balance) During the first month of operation of Gordon Construction, Inc., completed the following transactions: June 2 Gordon received $55,000 cash and issued common stock to the stockholders. 3 Purchased supplies, $3,000, and equipment, $5,200, on account. 4 Performed services for a client and received cash, $6,300. 7 Paid cash to acquire land, $37,000....
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT