-
- Outline and describe the process of computer forensics.
- What types of training must be provided to computer and network forensics investigators? Explain.
- With regard to the above scenario, as the crime scene technician, what would you photograph? Why? Explain in detail.
- What if the computer is a personal desktop not connected to a particular network?
- Should you shut it down? Explain in detail.
- What if the computer is networked with other computers in a building?
- What would be the next step after locating the machine? Explain your reasoning.
- When would computer forensics evidence become inadmissible in court? Explain.
- What can be done to avoid this? Explain.
- Be sure to reference all sources using APA style.