Initial Procedures in Computer Crime Scene Investigations

Initial Procedures in Computer Crime Scene Investigations

Table of Contents

Preliminary Interviews

Preliminary interviews form a critical component of initial investigations in computer crime scene. While conducting the preliminary interviews, the responder must recognize all individuals in the crime scene who could have information about the crime. However, these individuals should not be allowed to access or contact with all electronic devices within the crime scene. The second step encompasses the establishment of the identity of the individuals using the digital devices. It is also vital for the responder to gather adequate information about the computers in the crime scene (Rose, 2010).


The responder must then collect information concerning the uses of the digital platforms at the crime scene. Information pertaining to the Internet Protocol addresses of the machines at the crime scene is also an essential component of preliminary interviews. Additionally, it is vital for the responder to collect as much information as possible about the different user accounts. This includes social networks as well as emails.


Importance of Protocols

There are various implications if the responder does not follow the stipulated procedures for preliminary interviews. For instance, if he or she fails to establish the access passwords, investigators might encounter difficulties while trying to open the computers. The passwords are also vital in investigating the secrets underlying the criminal activity. Supposing the interviewees do not disclose the passwords, they can easily conceal sensitive information pertaining to the crime. While conducting preliminary interviews, investigators might face the challenge of resistance from interviewees. For instance, the witnesses might be reluctant to reveal information about private user accounts. There is also the challenge of inaccurate information from the individuals at the crime scene. These challenges can hamper the entire investigation process (Rose, 2010).


Evidence Collection Tool

                 Preliminary Activities

There are several critical activities that should be accomplished before embarking on forensic investigation. Firstly, it is extremely crucial to secure all digital devices at the crime scene. Intruders, outsiders or other individuals should not tamper with these devices. This helps in keeping the evidence intact. Apart from securing these devices, it is vital for the responder to conduct interviews with the individuals present at the crime scene. These interviews might serve as crucial evidence at advanced stages of the investigation (Reyes, 2007). The preliminary interviews also serve as an excellent basis of understanding the criminal activity. In the event that the electronic devices at the crime scene are off, they should be left in the same condition. This is vital in avoiding unwanted interferences with the evidence.


EnCase Functionality

The acquisition of data from almost all types of digital platforms is a valuable function in forensics investigation. This software has the capacity to extract and assess information from digital platforms such as emails, HTML, hard drives and external hard disks among others. In forensics investigation, minute information can make the difference in a serious case. For instance, a malicious hacker might be spreading a dangerous virus through an encrypted HTML file. However, the forensic investigators can detect such files through the EnCase software. Additionally, EnCase serves as an excellent tool for assessing the authenticity of evidence in computer crime. The investigators might have gigabytes worth of data that comprise potential evidence. Without having a reliable platform like EnCase, it might be challenging to evaluate such data (Reyes, 2007).


New Beginning and Prototyping

IT Revolution

The statement by Friedman refers to the commencement of an era in which information technology would transform almost all aspects of life. This encompasses social interactions, health and even business. Additionally, the statement by Friedman shows how he envisioned tremendous strides and innovations in information technology. These innovations would serve as the platform for transforming lives around the world. During the past forty years, the planet has experienced phenomenal advancements in information technology. This includes platforms such as software applications and exemplary digital platforms. Although Friedman had a vision of such innovations, he did not predict the speed at which they would occur (Casey, 2002).


Prototyping

Prototyping encompasses the development of partial software systems. It serves as an excellent tactic for evaluating the effectiveness of the final software application. Through prototyping, the developer gains insights about the functionality of the complete package. In essence, prototyping serves as a form of trial for software applications. For emerging technology projects, it is vital to-embrace an approach that facilitates for feedback from users. Such feedback is vital towards streamlining the efficiency of the final product. Additionally, such an approach is helpful in averting potential pitfalls during the implementation of the project. A combination of different approaches would not be effective in prototyping (Reyes, 2002). The combination would create a lot of operational costs. For instance, implementing the new software applications in different platforms would consume a lot of time and financial resources. Additionally, a combination of different approaches would contribute towards risks. A higher number of risks compromise overall effectiveness of prototyping.


Risk Management

Project Risk Management

Project risk management serves as a vital tool in that it reduces the costs incurred. Without minimizing risks, projects would consume extensive budgets both in terms of time and financial resources. Risk management is also vital in terms of coordinating the different activities that comprise a project. Without appropriate coordination, it would be difficult for projects to realize the various goals and objectives. Risk management also affects other operations within an organization. Some risks have an inherent capacity to curtail the efficiency of all departments within an organization.


For instance, budget deficits affect the availability of resources in all departments within an organization. Risk management is also an essential platform for averting the failure of information systems. This is because it helps in predicting potential pitfalls (Rose, 2010). Consequently, the project manager implements adequate mechanisms for dealing with such pitfalls. The overall efficiency of any project is dependent on the extent to which risks are mitigated. Additionally, this also affects organizational productivity. The implementation of applications that help in averting irrelevant expenses is an excellent example of project risk management.


Risk Management and Cost Estimation

Project risk management has direct association with cost estimation. When a project has many risks, there are high chances of incurring unnecessary costs. On the other hand, minimization of risks contributes towards the mitigation of overall costs for the project. Based on the example in the previous section, implementation of applications that help in averting irrelevant expenses streamlines the efficiency of projects (Reyes, 2007). This presents the relationship between cost estimation and risk management. When the project encompasses accurate estimations for costs, the standards of effectiveness are higher.


References

Casey, E. (2002). Handbook of computer crime investigation, Burlington, MA: Elsevier
Reyes, A. (2007). Cyber crime investigations, Syngress Publications
Rose, K. (2010). Electronic crime scene investigation, Washington DC: DIANE Publishing




Is this your assignment or some part of it?

We can do it for you! Click to Order!



Order Now


Translate »

You cannot copy content of this page