Learning Log #2

This is our second week in our EVIDENCE class. What we have discussed this week is about Procedures in Computer Forensics and some review about what we have discussed in COMSEC and in INVESTI, like the Incident Response Process and also includes the Search Warrant thingy. If there is no search warrant, what will happen? And when do we not need it? This is where the six exceptions would help to give access to the authorities. A quick review 😛 These are the Consent, Exigent Circumstances, Inventory Searches, International Issues, Search Incident, Lawful Arrest and the Border searches!

We also reviewed about the Chain of Custody processes, if evidence is gathered there is a proper procedure that should be followed because it is standard procedure. If it is not followed the evidence could be damaged and there is no record of who possessed it last.

In the half portion of our discussion, we were task to do an analysis in the case “TJX Data Loss”. We are asked to answer some questions if TJX is liable in the Data Loss or not. Unfortunately, YES. They are at fault. Belat. Hahahaha.

We also asked to do a PESTEL and the OT analysis of the National Cybersercurity Plan that is to be included the RAMPAGE lol. It is a part of the summit which Ms. Rhea will attend.

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s