The Investigator’s Office and Laboratory

0.0(0)
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/27

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

28 Terms

1
New cards
spreadsheet program
Using a(n) ________ helps you keep track of past investigation expenses so that you can extrapolate expected future costs.
2
New cards
assurance
The manager also establishes and promotes quality ________ processes for the labs staff to follow.
3
New cards
digital forensics
Improvements in hardware technology offer more flexibility in ________.
4
New cards
Digital Forensics Lab
This is where you conduct investigations, store evidence, and do most of your work
5
New cards
ANSI-ASQ National Accreditation Board
Provides accreditation of crime and forensics labs worldwide
6
New cards
Certified Forensic Computer Examiner (CFCE)
Candidates who complete the IACIS test successfully
7
New cards
Disaster Recovery Plan
Ensures that you can restore your workstations and file servers to their original condition or a lab-like building if a catastrophic failure occurs
8
New cards
Configuration Management
A process of recording all updates you make to your workstation
9
New cards
Digital Forensics Lab
This is where you conduct investigations, store evidence, and do most of your work.
10
New cards
ANSI-ASQ National Accreditation Board
Provides accreditation of crime and forensics labs worldwide. This accreditation includes forensics labs that analyze digital evidence.
11
New cards
TEMPEST
To protect your investigations, you might consider constructing a ______ qualified lab, which requires lining the walls, ceiling, floor, and doors with specially grounded conductive metal sheets.
12
New cards
antistatic pads
Because static electricity is a major problem when handling computer parts, placing ______ around electronic workbenches and workstations is recommended.
13
New cards
ANAB Website
The _____ summarizes the requirements of managing a digital forensics lab, handling and preserving evidence, performing laboratory procedures, setting personnel requirements, and encouraging professional development.
14
New cards
spreadsheet program
Using a ______ helps you keep track of past investigation expenses so that you can extrapolate expected future costs.
15
New cards
International Association of Computer Investigative Specialists (IACIS)
One of the oldest professional digital forensics organizations created by police officers who wanted to formalize credentials in digital investigations.
16
New cards
Certified Forensic Computer Examiner (CFCE)
Candidates who complete the IACIS test successfully.
17
New cards
Certified Cyber Forensics Professional (CCFP)
Requires knowledge of digital forensics, malware analysis, incident response, e-discovery, and other disciplines related to cyber investigations.
18
New cards
High Tech Crime Network (HTCN)
Requires a review of all related training, including training in one of its approved courses, and a review of the candidate’s work history.
19
New cards
EnCase Certified Examiner Certification
Candidates for this certification are required to have a licensed copy of EnCase.
20
New cards
AccessData Ultimate Toolkit
ACE certification is open to the public and private sectors and is specific to use and mastery of the ______.
21
New cards
High-risk
_____ investigations, such as those involving national security or murder, demand more security than the minimum lab requirements provide.
22
New cards
emit electromagnetic radiation (EMR)
Most electronic devices _______. Certain kinds of equipment can intercept this, which can be used to determine the data the device is transmitting or displaying.
23
New cards
Copper sheeting
This sheeting is used because it conducts electricity well.
24
New cards
separate trash containers
Using _______ maintains the integrity of criminal investigation processes and protects trade secrets and attorney-client privileged communication in a private company.
25
New cards
regional computer crime lab
A ______ has high physical security needs because of the risks of losing, corrupting, or damaging evidence.
26
New cards
Disaster Recovery Plan
Ensures that you can restore your workstations and file servers to their original condition or a lab-like building if a catastrophic failure occurs.
27
New cards
Configuration Management
A process of recording all updates you make to your workstation.
28
New cards
Risk management
It involves determining how much risk is acceptable for any process or operation, such as replacing equipment.