Risk analysis
Defining the risk is the first principle. The nature of the risk on the table will dictate how the scenario at hand will play out (Weisburd, 2015). For instance, the worst-case scenario when driving a vehicle is the occurrence of an accident. The second is risk control, which unveils possible solutions to the risk. Risk finance and management deal with the after effects of the risk
Steps in coming up with a risk strategy
The first step is recognition and description of the risk, which in turn helps to gauge the outcomes. The second is evaluation of the risk and its features, which helps to anticipate any extra effects and gain insight into the main objectives. The third is assessing the nature of the risk by knowing its scale and impact hence the plan should fit the risk (Weisburd, 2015).
Information systems
Information systems are able to collect and interpret risk data (Weisburd, 2015).
Safeguarding digital evidence
Ensuring that the computer system containing the evidence does not shut down because the information stored in the RAM may become vulnerable to manipulation. The second step is securing it from any open network through which a hacker may manipulate evidence(Weisburd, 2015). The evidence can only come into contact specialists to avoid any chances of breaching. The officer collecting the evidence ensures that the electrical device carrying the information is clean and safe.
How the process safeguards evidence
The process explained above ensures that digital evidence is free of any breaching and a standby emergency strategy protects data from deletion or being lost (Weisburd, 2015). Documenting the steps helps to secure the evidence in a viable manner and in case of any misstep; one can notice a mishap took place.
How an analysts proofs evidence is untampered with
Through a chain of checkpoints and procedures helps the custodian of the evidence proof to others that the evidence remained intact during collection and preservation process (Weisburd, 2015). Hence when the evidence is under the surveillance of more than one person, it is easy to verify and administer it in court in front of a jury. Therefore as a juror, I can identify the trained specialists who handled the evidence.
References
Weisburd, D. (2015). The law of crime concentration and the criminology of place. Criminology, 53(2), 133-157.