Civil Cases - CORRECT ANSWER Violation of contracts and lawsuits
Criminal Cases - CORRECT ANSWER warrant authority can seize computers, forensic
... [Show More] investigation violation of law
Administrative Cases - CORRECT ANSWER noncriminal, violating of orgs policies, misuse of resources. Results in disciplinary action
rules of evidence - CORRECT ANSWER Admissible in a court of law: understandable, admissible, authentic, reliable, complete
Best Evidence Rule - CORRECT ANSWER original evidence rather than copy, duplicate accepted if court finds duplicate genuine
Rule 102 - CORRECT ANSWER Purpose ability to proceed failure, without unjustifiable expense and delay, development of evidence law
Rule 103 - CORRECT ANSWER Rules on Evidence
Preserving a Claim of error, No Need to Renew an Objection or Offer proof, prevent jury haring inadmissible evidence
Rule 104 - CORRECT ANSWER Preliminary Questions court decides if witness is qualified and evidence
Rule 105 - CORRECT ANSWER Limited Admissibility
Rule 801, 803, 804 - CORRECT ANSWER Hearsay Rules
Rule 1001 - CORRECT ANSWER Definitions content of writings, recordings and photogrraphs. Definition of original evidence
Rule 1002 - CORRECT ANSWER Requirement of original evidence
Rule 1003 - CORRECT ANSWER Admissibility of Duplicates evidence
Rule 1004 - CORRECT ANSWER Admissibility of Other Evidence of Content
Scientific Working Group on Digital Evidence (SWGDE) - CORRECT ANSWER Principle 1, accuracy and reliability of the evidence
Standards and Criteria, SOP then review and record in scientific manner
Forensic Readiness - CORRECT ANSWER Orgs ability to optimally use digital evidence in limited time and minimal costs. Minimal disruption
Maintain business continuity. Prevent repeat attacks.
Forensics Readiness Planning - CORRECT ANSWER Set of processes
Identify potential evidence, sources of evidence, policy to collect, policy to handle and store, full or formal investigations, SOP, legal advisory board creation, incident response team
Enterprise Theory of Investigation (ETI) - CORRECT ANSWER Solving one crime can tie it back to a criminal organizations activity
Code of Ethics - CORRECT ANSWER behavior of an investigator. SOP, morals, integrity of the evidence, laws, honesty,
Groups for Computers Forensics Resources - CORRECT ANSWER Computer Technology Investigators Network, High Technology Crime Investigation Association, Network of computer forensic experts, Journals, Case studies
Fourth Amendment - CORRECT ANSWER Protects against unreasonable search and seizure without a search warrant
Gramm-Leach-Bliley Act (GLBA) - CORRECT ANSWER Financial institutions safeguard sensitive data
Federal Information Security Modernization Act of 2014 (FISMA) - CORRECT ANSWER federal information systems to have information security controls in place
Health Insurance Portability And Accountability Act of 1996 (HIPPA) - CORRECT ANSWER PHI, Privacy Rule - disclosure of health info, Security Rule - standards,
The Electronic Communications Privacy Act - CORRECT ANSWER regulates the interception of electronic communications by individuals as well as the government
General Data Protection Regulation (GDPR) - CORRECT ANSWER Encryption and anomalous of data, CIA and resilience, processing information requests
Data Protection Act of 2018 - CORRECT ANSWER Regulation on processing of ingo relating to individuals
PCI DSS (Payment Card Industry Data Security Standard) - CORRECT ANSWER Credit cards
Sarbanes-Oxley Act (SOX) 2002 - CORRECT ANSWER Protect investors from fraudulent accounts activities by companies [Show Less]