Please enable JavaScript.
Coggle requires JavaScript to display documents.
Computer Forensics and Investigation - Coggle Diagram
Computer Forensics and Investigation
What is Computer Forensics
Digital evidence
Computer systems
Data recovery firms
Storage devices
Colleges and Universities
Mobile devices
Organizations
Networking equipment
Military
Other potential sources
Individuals
Media analysis
Network analysis
Code analysis
What is the Role of a Computer Forensic Examiner
Locard's exchange principle
Certified Computer Examiner (CCE)
Certified Forensic Computer Examiner (CFCE)
Certified Computer Forensics Examiner (CCFE)
GIAC Certified Forensic Analyst (GCFA)
Collecting, Handling, and Using Digital Evidence
To commit a crime
As a target of crime
To facilitate a crime
As a witness to crime
The Investigative Process
Collection
Examination
forensic duplicate image
Persistent data
Volatile data
Preservation
Chain of Custody
Presentation
Identification
Legal issues involving digital evidence
Authority to Collect Evidence
The fourth amendment and search warrants
The silver platter doctrine
Consent
Plain view doctrine
Inventory search
Exigent circumstances
Search incident to a lawful arrest
Federal laws regarding electronic data collection
The wiretap act
Network banner
The Pen Register and Trap and Trace Statute
Admissibility of Evidence
Computer-generated records
Records created by people and stored electronically
probative evidence
fruit of the poisonous tree doctrine
The Hearsay Rule
The Best Evidence Rule