SlideShare a Scribd company logo
Module LXIV - Forensics Investigation Templates
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Forensics Investigation
Templates
11. CD Investigation Checklist
12. Zip Drive Investigation Checklist
13. Flash Drives Investigation Checklist
14. Tape Investigation Checklist
15. Handheld Device Investigation Checklist
16. Fax Investigation Checklist
17. Hub Investigation Checklist
18. Switch Investigation Checklist
19. Router Investigation Checklist
20. Physical Security Checklist
21. Identity Theft Checklist
1. Case Feedback Form
2. Seizure Record
3. List of Evidences Gathered Form
4. Evidence Preservation Checklist
5. BIOS Configuration
6. System Configuration
7. Application Summary
8. Monitor Investigation Checklist
9. Hard Disk Investigation Checklist
10. Floppy Investigation Checklist
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Case Feedback Form
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Case Feedback Form (cont’d)
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Seizure Record
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Seizure Record (cont’d)
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
List of Evidence Gathered Form
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
List of Evidences Gathered Form
(cont’d)
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Evidence Preservation Checklist
1 • Photograph crime scene
2 • Report the crime immediately to immediate authority
3 • Leave the computers and equipment as they are
4 • Don’t shut down or switch on the computers
5 • Switch over to your backup/failover systems
6 • Don’t run any programs
7 • Don’t access files
8 • Establish the chain of custody from the beginning
9 • Preserve physical evidence
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
BIOS Configuration
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
BIOS Configuration (cont’d)
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
System Configuration
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
System Configuration (cont’d)
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
System Configuration (cont’d)
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Application Summary
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Application Summary (cont’d)
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Monitor Investigation Checklist
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Monitor Investigation Checklist
(cont’d)
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Hard Disk Investigation Checklist
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Hard Disk Investigation
Checklist (cont’d)
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Hard Disk Investigation
Checklist (cont’d)
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Floppy Investigation Checklist
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Floppy Investigation Checklist
(cont’d)
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
CD Investigation Checklist
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
CD Investigation Checklist (cont’d)
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Zip Drive Investigation Checklist
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Zip Drive Investigation Checklist
(cont’d)
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Flash Drives Investigation
Checklist
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Flash Drives Investigation
Checklist (cont’d)
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Tape Investigation Checklist
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Tape Investigation Checklist
(cont’d)
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Handheld Device Investigation
Checklist: Blackberry
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Handheld Device Investigation
Checklist: Blackberry (cont’d)
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Handheld Device Investigation
Checklist: Blackberry (cont’d)
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Handheld Device Investigation
Checklist: Blackberry (cont’d)
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Handheld Device Investigation
Checklist: iPod
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Handheld Device Investigation
Checklist: iPod (cont’d)
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Handheld Device Investigation
Checklist: iPod (cont’d)
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Handheld Device Investigation
Checklist: Mobile Phone
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Handheld Device Investigation
Checklist: Mobile Phone (cont’d)
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Handheld Device Investigation
Checklist: Mobile Phone (cont’d)
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Handheld Device Investigation
Checklist: PDA
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Handheld Device Investigation
Checklist: PDA (cont’d)
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Handheld Device Investigation
Checklist: PDA (cont’d)
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Fax Investigation Checklist
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Fax Investigation Checklist
(cont’d)
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Fax Investigation Checklist
(cont’d)
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Hub Investigation Checklist
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Hub Investigation Checklist
(cont’d)
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Hub Investigation Checklist
(cont’d)
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Switch Investigation Checklist
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Switch Investigation Checklist
(cont’d)
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Switch Investigation Checklist
(cont’d)
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Router Investigation Checklist
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Router Investigation Checklist
(cont’d)
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Router Investigation Checklist
(cont’d)
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Physical Security Checklist
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Physical Security Checklist
(cont’d)
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Identity Theft Checklist
1. Report the crime to the police:
1. Provide copies of evidence
2. Obtain copy of the Police Report
2. Request information on fraudulent accounts
3. In the case of lost credit cards:
1. Call the bank and close your account
2. Follow up and trace your cards
4. In case your mail is stolen and your address is changed:
1. Notify the postal inspector
5. If someone has stolen your Social Security number:
1. Call the Employment Department
6. Contact FTC (Federal Trade Commission)
7. Other:
1. Use secure mailboxes to send and receive mail
2. Shred confidential documents
3. Review credit reports annually
4. Report lost or stolen checks immediately
5. Do not ignore bills that include suspicious charges

More Related Content

PDF
File000175
PDF
File000138
PDF
File000143
PDF
File000131
PDF
File000174
PDF
File000126
PDF
File000132
PDF
File000125
File000175
File000138
File000143
File000131
File000174
File000126
File000132
File000125

What's hot (20)

PDF
File000149
PDF
File000136
PDF
Ce hv6 module 52 hacking rss and atom
PDF
Ce hv6 module 46 securing laptop computers
PDF
Ce hv6 module 50 software piracy and warez
PDF
File000139
PDF
File000128
PDF
Ceh v5 module 17 physical security
PDF
File000127
PDF
Ce hv6 module 53 hacking web browsers
PDF
Ceh v5 module 12 web application vulnerabilities
PDF
Ce hv6 module 66 security convergence
PDF
Ce hv6 module 56 hacking global positioning system
PDF
System monitoring and network intrusion using DDS and CEP
PDF
File000141
PDF
Ceh v5 module 08 denial of service
PDF
Ceh v5 module 19 evading ids firewall and honeypot
PDF
Ceh v5 module 22 penetration testing
PDF
Ceh v5 module 04 enumeration
PDF
Ceh v5 module 01 introduction to ethical hacking
File000149
File000136
Ce hv6 module 52 hacking rss and atom
Ce hv6 module 46 securing laptop computers
Ce hv6 module 50 software piracy and warez
File000139
File000128
Ceh v5 module 17 physical security
File000127
Ce hv6 module 53 hacking web browsers
Ceh v5 module 12 web application vulnerabilities
Ce hv6 module 66 security convergence
Ce hv6 module 56 hacking global positioning system
System monitoring and network intrusion using DDS and CEP
File000141
Ceh v5 module 08 denial of service
Ceh v5 module 19 evading ids firewall and honeypot
Ceh v5 module 22 penetration testing
Ceh v5 module 04 enumeration
Ceh v5 module 01 introduction to ethical hacking
Ad

Similar to CHFI 1 (20)

PDF
Ce hv6 module 55 preventing data loss
PDF
File000115
PDF
File000118
PPTX
PACE-IT, Security+ 2.4: Basic Forensic Procedures
PPT
Latihan4 comp-forensic-bab3
PDF
Computer forensic lifecycle
PDF
Computer forensic lifecycle
PPT
Data security
PPT
Computer Forensics
PDF
File000151
PPTX
PPT - CSS Q3- MODULE 1 handtools, esd tools, cleaning tools diagnostic tools
PDF
Security Policy Checklist
PDF
CNIT 121: 11 Analysis Methodology
PDF
CNIT 152 11 Analysis Methodology
PPS
Power Point Lesson 03
PPTX
First Responders Course - Session 8 - Digital Evidence Collection [2004]
PPTX
Introduction to computer forensics in IT society
PPTX
L05 slides
PDF
File000166
PDF
File000113
Ce hv6 module 55 preventing data loss
File000115
File000118
PACE-IT, Security+ 2.4: Basic Forensic Procedures
Latihan4 comp-forensic-bab3
Computer forensic lifecycle
Computer forensic lifecycle
Data security
Computer Forensics
File000151
PPT - CSS Q3- MODULE 1 handtools, esd tools, cleaning tools diagnostic tools
Security Policy Checklist
CNIT 121: 11 Analysis Methodology
CNIT 152 11 Analysis Methodology
Power Point Lesson 03
First Responders Course - Session 8 - Digital Evidence Collection [2004]
Introduction to computer forensics in IT society
L05 slides
File000166
File000113
Ad

More from Desmond Devendran (20)

PDF
Siam key-facts
PDF
Siam foundation-process-guides
PDF
Siam foundation-body-of-knowledge
PDF
Enterprise service-management-essentials
PDF
Service Integration and Management
PDF
Diagram of iso_22301_implementation_process_en
PDF
File000176
PDF
File000173
PDF
File000172
PDF
File000171
PDF
File000170
PDF
File000169
PDF
File000168
PDF
File000167
PDF
File000165
PDF
File000164
PDF
File000163
PDF
File000162
PDF
File000161
PDF
File000160
Siam key-facts
Siam foundation-process-guides
Siam foundation-body-of-knowledge
Enterprise service-management-essentials
Service Integration and Management
Diagram of iso_22301_implementation_process_en
File000176
File000173
File000172
File000171
File000170
File000169
File000168
File000167
File000165
File000164
File000163
File000162
File000161
File000160

Recently uploaded (20)

PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPTX
Programs and apps: productivity, graphics, security and other tools
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Encapsulation theory and applications.pdf
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
cuic standard and advanced reporting.pdf
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Empathic Computing: Creating Shared Understanding
DOCX
The AUB Centre for AI in Media Proposal.docx
 
PPTX
Big Data Technologies - Introduction.pptx
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
 
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Machine learning based COVID-19 study performance prediction
PPTX
Understanding_Digital_Forensics_Presentation.pptx
Spectral efficient network and resource selection model in 5G networks
20250228 LYD VKU AI Blended-Learning.pptx
Programs and apps: productivity, graphics, security and other tools
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Encapsulation theory and applications.pdf
Chapter 3 Spatial Domain Image Processing.pdf
cuic standard and advanced reporting.pdf
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Advanced methodologies resolving dimensionality complications for autism neur...
Review of recent advances in non-invasive hemoglobin estimation
MIND Revenue Release Quarter 2 2025 Press Release
Empathic Computing: Creating Shared Understanding
The AUB Centre for AI in Media Proposal.docx
 
Big Data Technologies - Introduction.pptx
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
The Rise and Fall of 3GPP – Time for a Sabbatical?
 
Mobile App Security Testing_ A Comprehensive Guide.pdf
Machine learning based COVID-19 study performance prediction
Understanding_Digital_Forensics_Presentation.pptx

CHFI 1

  • 1. Module LXIV - Forensics Investigation Templates
  • 2. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Forensics Investigation Templates 11. CD Investigation Checklist 12. Zip Drive Investigation Checklist 13. Flash Drives Investigation Checklist 14. Tape Investigation Checklist 15. Handheld Device Investigation Checklist 16. Fax Investigation Checklist 17. Hub Investigation Checklist 18. Switch Investigation Checklist 19. Router Investigation Checklist 20. Physical Security Checklist 21. Identity Theft Checklist 1. Case Feedback Form 2. Seizure Record 3. List of Evidences Gathered Form 4. Evidence Preservation Checklist 5. BIOS Configuration 6. System Configuration 7. Application Summary 8. Monitor Investigation Checklist 9. Hard Disk Investigation Checklist 10. Floppy Investigation Checklist
  • 3. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Case Feedback Form
  • 4. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Case Feedback Form (cont’d)
  • 5. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Seizure Record
  • 6. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Seizure Record (cont’d)
  • 7. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited List of Evidence Gathered Form
  • 8. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited List of Evidences Gathered Form (cont’d)
  • 9. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Evidence Preservation Checklist 1 • Photograph crime scene 2 • Report the crime immediately to immediate authority 3 • Leave the computers and equipment as they are 4 • Don’t shut down or switch on the computers 5 • Switch over to your backup/failover systems 6 • Don’t run any programs 7 • Don’t access files 8 • Establish the chain of custody from the beginning 9 • Preserve physical evidence
  • 10. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited BIOS Configuration
  • 11. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited BIOS Configuration (cont’d)
  • 12. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited System Configuration
  • 13. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited System Configuration (cont’d)
  • 14. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited System Configuration (cont’d)
  • 15. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Application Summary
  • 16. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Application Summary (cont’d)
  • 17. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Monitor Investigation Checklist
  • 18. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Monitor Investigation Checklist (cont’d)
  • 19. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Hard Disk Investigation Checklist
  • 20. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Hard Disk Investigation Checklist (cont’d)
  • 21. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Hard Disk Investigation Checklist (cont’d)
  • 22. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Floppy Investigation Checklist
  • 23. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Floppy Investigation Checklist (cont’d)
  • 24. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited CD Investigation Checklist
  • 25. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited CD Investigation Checklist (cont’d)
  • 26. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Zip Drive Investigation Checklist
  • 27. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Zip Drive Investigation Checklist (cont’d)
  • 28. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Flash Drives Investigation Checklist
  • 29. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Flash Drives Investigation Checklist (cont’d)
  • 30. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Tape Investigation Checklist
  • 31. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Tape Investigation Checklist (cont’d)
  • 32. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Handheld Device Investigation Checklist: Blackberry
  • 33. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Handheld Device Investigation Checklist: Blackberry (cont’d)
  • 34. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Handheld Device Investigation Checklist: Blackberry (cont’d)
  • 35. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Handheld Device Investigation Checklist: Blackberry (cont’d)
  • 36. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Handheld Device Investigation Checklist: iPod
  • 37. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Handheld Device Investigation Checklist: iPod (cont’d)
  • 38. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Handheld Device Investigation Checklist: iPod (cont’d)
  • 39. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Handheld Device Investigation Checklist: Mobile Phone
  • 40. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Handheld Device Investigation Checklist: Mobile Phone (cont’d)
  • 41. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Handheld Device Investigation Checklist: Mobile Phone (cont’d)
  • 42. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Handheld Device Investigation Checklist: PDA
  • 43. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Handheld Device Investigation Checklist: PDA (cont’d)
  • 44. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Handheld Device Investigation Checklist: PDA (cont’d)
  • 45. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Fax Investigation Checklist
  • 46. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Fax Investigation Checklist (cont’d)
  • 47. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Fax Investigation Checklist (cont’d)
  • 48. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Hub Investigation Checklist
  • 49. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Hub Investigation Checklist (cont’d)
  • 50. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Hub Investigation Checklist (cont’d)
  • 51. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Switch Investigation Checklist
  • 52. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Switch Investigation Checklist (cont’d)
  • 53. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Switch Investigation Checklist (cont’d)
  • 54. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Router Investigation Checklist
  • 55. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Router Investigation Checklist (cont’d)
  • 56. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Router Investigation Checklist (cont’d)
  • 57. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Physical Security Checklist
  • 58. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Physical Security Checklist (cont’d)
  • 59. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Identity Theft Checklist 1. Report the crime to the police: 1. Provide copies of evidence 2. Obtain copy of the Police Report 2. Request information on fraudulent accounts 3. In the case of lost credit cards: 1. Call the bank and close your account 2. Follow up and trace your cards 4. In case your mail is stolen and your address is changed: 1. Notify the postal inspector 5. If someone has stolen your Social Security number: 1. Call the Employment Department 6. Contact FTC (Federal Trade Commission) 7. Other: 1. Use secure mailboxes to send and receive mail 2. Shred confidential documents 3. Review credit reports annually 4. Report lost or stolen checks immediately 5. Do not ignore bills that include suspicious charges