Waiting for answer This question has not been answered yet. You can hire a professional tutor to get the answer.
Week 8 Discussion CIS
Which actions should you take when you are investigating a computer crime? Does it matter how you investigate a computer crime?
"The Investigation of Computer-Related Crime" Please respond to the following:
- From the e-Activity, there are general principles that investigators must follow when they respond to any crime scene in which computers and electronic technology may be involved. Suggest at least two (2) general principles for proper evidence preservation for stand-alone personal computers, networked home personal computers, and network server business networks. Provide a rationale for your response.
- Discuss the major procedures that investigators must use in order to collect network trace evidence of computer-related crimes. Next, speculate on the primary concern of investigators as they execute the evidence-collection procedures in question, and explain the main reasons why you believe such a concern is valid. Justify your response.