Security | Optimize

Cybercrime evidence-preservation checklist

Note:An updated version of this checklist is now available. You can download it here. You've detected a computer crime and decided to report that activity to law enforcement. Before you touch the affected machine, open a single event log, or run another program; you must secure all digital evidence. Yet the steps necessary to maintain the integrity of digital evidence often run contrary to common IT practices. This checklist tells you what to do and what not to do in the aftermath of a computer crime. Don't let simple mistakes, such as powering off the machine or accessing affected files, ruin the chance of a successful prosecution.

Join this ongoing discussion of this download and share your experiences with the aftermath of a computer crime. Also, let us know if our Computer crime evidence-preservation checklist provided helpful information and if there's anything we can do to improve the document's format.

Format:
PDF
Size:
64 KB
Version:
1.0
Date:
Apr 2005
Author:
Tech Pro Research
Topic:
Security

Download Now

Not a Tech Pro Research member?
Sign up for a Free Trial and get access
to Tech Pro Research for one week.

People who downloaded this also downloaded