Write a detailed response explaining these steps and procedures.
Identify a specific type of cybercrime and provide answers to the subsequent questions using the crime you selected.
1. Identify the likely digital items that need to be collected and then properly secure them. (The digital items can be external storage devices such as USB thumb drives, CDs, cell phones, hand-held game system play stations, Sony game systems, paper with passwords on them hidden under a mouse pad and in a desk, butterfly, etc.)
2. Document the steps taken to properly secure digital evidence that you have chosen to take into custody.
3. Describe what “triage” of digital evidence means with regard to cyber investigations.
4. Explain chain of custody and how to secure and preserve digital evidence.
5. Finally, ensure that the steps to secure evidence are completed, including identifying how the items will then be transported to the evidence technician’s station/office.