1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Paul [167]
3 years ago
12

Discuss the major procedures that investigators must use in order to collect network trace evidence of computer-related crimes.

Computers and Technology
1 answer:
frez [133]3 years ago
8 0

Answer:

The answer is below

Explanation:

The major procedures that investigators must use to collect network trace evidence of computer-related crimes include the following:

1. Establish appropriate guidelines to follow: before starting the actual investigation, all the legal procedures and instructions to follow must be clearly stated and shown to everybody involved in the investigation process.

2. Assess the Evidence: the investigators must assess all the available evidence by checking the computer through a specific means. The assessment includes checking of hard drives, email accounts, social networking sites, or similar digital prints that can be used as proof of the criminal activities

3. Acquire the Evidence: here the investigators must find an appropriate means of gathering the evidence formally and legally. This may involve the removal of any form of hardware such as hard drives, and software-related items that can be extracted.

4. Examine the Evidence: this involved examination of the acquired evidence, to determine if it can be used as proof or not. This involved analyzing the evidence to check if they correlate with the criminal activities under investigation. Some of the things to check include, date of formation of the evidence, the names attached to it, the routes those data were sent or received from, etc.

5. Prepare a report and document them appropriately: this involved the proper detailing and recording of the information derived from the evidence. It includes the time of evidence examination and methods used in examining them. Also, the means at which they acquired the evidence among others.

You might be interested in
When you boot up a computer and hear a single beep, but the screen is blank, what can you assume is the source of the problem?
olchik [2.2K]
Either your screen isnt plugged in and synced properly or you have a problem in the automatic boot system 
5 0
3 years ago
Read 2 more answers
True or false: you should reuse passwords on multiple websites because it will help you remember those passwords
Fudgin [204]

Answer: False

Explanation: Even though you can remember it is not really good because some hackers can track you passwords through those websites and could hack your account.

3 0
2 years ago
Read 2 more answers
You have installed a device that has eight interfaces and does not forward broadcast packets. What kind of device did you instal
Novay_Z [31]
A router, possibly. Thought I'm not for sure because I'm not in computers and technology

7 0
2 years ago
Read 2 more answers
To quickly save a file, use the keyboard shortcut ________. ctrtl shift s ctrl s ctrl a ctrl shift-a
Advocard [28]
You have to use control + s only. but if you want to save it in different format, use control + shift + S
3 0
2 years ago
Write an if statement that tests to see whether a String stored in a variable named phrase begins with a capital letter. If the
mamaluj [8]

Answer & Explanation:

//written in java

public class Main {

   public static void main(String[] args) {

       //String stored in a variable named phrase

       String phrase = "Brainly";

       //Checking whether the first character is in upper case or not

       if (Character.isUpperCase(phrase.charAt(0)))

           System.out.println("capital");

       else

           System.out.println("not capital");

   }

}

4 0
3 years ago
Other questions:
  • How to do pseudocode and flowchart in BMI ( computer programming ​
    11·1 answer
  • 7. The penalties for a first-time DUI charge include a fine of __________. A. up to $500 for a BAL of .08 to .15 B. $500-$1,000
    5·1 answer
  • The network architecture component that is a special LAN with a group of servers that enables electronic data exchange of betwee
    8·1 answer
  • Which two standards below represent newer versions of stp??
    13·1 answer
  • An IT professional with a customer-service
    13·1 answer
  • Which statement describes how to insert the IF, COUNTIF, or SUM function into a cell?
    11·1 answer
  • The cat store needs your help! The base class Animal has private fields animalName, and animalAge. The derived class Cat extends
    9·1 answer
  • photoshop Curves, photoshop an image and manipulate the curves on a selection of the photo. upload the original photo and The ph
    5·2 answers
  • Which of these is installed only on Apple smartphones and tablets?
    5·2 answers
  • Which display technology was developed by apple, produces vibrant colors, and supports viewing from all angles?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!