Which of the following is generally the first step in a computer crime investigative process?

How do you want to study today?

Terms in this set (128)

What are the four privacy torts that still exist today?
ECPA, Privacy Act, E-Government Act, and Patriot Act
intrusion into seclusion, portrayal in a false light, appropriation of likeness or identity, and public disclosure of private facts
in the U.S. Constitution, the First Amendment, Third Amendment, Fourth Amendment, and Fifth Amendment

Other sets by this creator

Which of the following should be the first step while investigating a computer crime?

While investigating computer crime, the investigator should first determine that an incident has occurred, and then assess its impact.

What is one of the first steps in a computer forensic investigation according to the FBI?

The first step in any computer forensic investigation is to make a copy of the suspected storage device.

What is the first step required in preparing a computer for forensics investigation quizlet?

What is the First Step required in preparing a computer for forensics investigation? network traffic and event logs in order to investigate a network security incident.

When handling a seized computer what steps must be taken prior to beginning a digital forensic analysis?

The Nine Phases of Digital Forensics.
First Response. As soon as a security incident occurs and is reported, a digital forensic team jumps into action..
Search and Seizure. ... .
Evidence Collection. ... .
Securing of the Evidence. ... .
Data Acquisition. ... .
Data Analysis. ... .
Evidence Assessment. ... .
Documentation and Reporting..