Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
Importance of a computer forensic analysis
Assignment on computer forensics
Computer forensics 2 pg essay
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Recommended: Importance of a computer forensic analysis
Future aspects of computer forensics By steev ray Dec 7, 2012 Computers have become more prevalent in the existing modern society. There is huge rise in the computer crimes across the world. With the rise in computer crimes, there is the urgency to have computer forensic specialist to investigate the crimes and demands of computer forensics has grown up. Its needs are felt in all the local, federal, state and modern law enforcement agencies. It is important to identify and take necessary action against who engage in such crimes. There have been the immense rises in computer crimes all across the globe. It is mandatory to monitor the computer crimes and at the same time, there is the urgent need to investigate the criminal activities where …show more content…
This is having the competent role to investigate, analyze and gather the evidences mandatory to reproduce in the court for legal proceedings. Main aim is to prepare an investigation structure to gather the wide range of evidences to identify the type of crime and criminal. The forensic experts utilize the set procedures in which investigation are recorded in the digital forms and stored in the pristine condition. These processes involves the physical isolation of computer to investigate the crimes by making the digital copy of the hard drive data's. This is process to collect, preserve, analyze and represent computer-related facts. Computer forensic experts use variety of procedure and function to identity the hard drive contents, hidden folders and unallocated disk spaces for damaged, deleted and encrypted files. These evidences are properly documents, organized and stores in the original form to actual litigation. Crucial data's are gathered from multiple sources recorded in digital form. This includes text messaging, emails, internet, tapes, disks, CD's and printouts. In the clear sense, it is used to investigate crimes directly or indirectly related to
Digital Forensic is the process of uncovering and interpreting electronic data that can be used in a court of law. It requires a set of standards to show how the information that is gathered, preserve, and analyzed is strictly followed. The analysts need to understand the evolution of the current technology and how it will impact how they gather their information. The investigator is able to uncover evidence and analyze it to gain the understanding of the motives, crime, and the criminal’s identity to help solve the crime. As computers and technology continue to become a part of our everyday lives, the cyber realm contains a growing realm for evince in all types of criminal investigations (Cummings, 2008) Digital forensics is a way to connect information security and law enforcement. It ensures that the digital evidence is collected in a way that it can make it into the courts in an unhampered or uncontaminated way (Dlamini, M., Eloff, J. & Eloff, M., 2009).
It is the computer forensics job to look through all of the computer files, even the deleted ones, to see if there are any incriminating files that would prove them guilty. Even reporting them to the jury is one of the jobs that a computer forensic person might have. Not only does this community work closely with eh police force, they can also work within the FBI or a company that uses computers in their business like Apple. Th...
Now-a-days the technology advancements is are now mainly used for crimes. To investigate this occurring crimes digital forensic investigator is required.
Technologies are advancing in today's world where more information is being generated, stored and distributed through digital gadgets. This requires investigators and forensic expert to increase the use of digital evidence gathering as a tool to fight against cyber-crime (International competition network, n.d.).
Solomon, M. G., Rudolph, K., Tittel, E., Broom, N., & Barrett, D. (2011). Computer Forensics Jumpstart (2nd ed.). Indianapolis, IN: Wiley Publishing Inc..
Despite these advantages, Grispos, Glisson and Storer (2012) highlighted several challenges that the cloud environment may pose for digital forensic investigators during the collection and analysis phrases of the investigation process. Artifacts, data used that can be used as evidence, are often hard to extract because resources can be redirected and/or disappear destroying the trial of evidence in the process. During the preparation stage of the investigation, an investigator trained in the conventional methods of digital forensics will usually obtain a comprehensive history and overview of the crime scene, and have a idea of what will be required from the organization in order to proceed with the investigation. However, in the case of network forensic investigations, there is a no comprehensive history and overview of the suspected crime scene, and there is a lack of structured environment in which data transmissions between various network points and platforms can be collected as evidence. There may also be a lack of structure in the target environment and methods of monitoring and reporting transmission information may not exist. The segregation of duties and differences in the service models that exists between cloud service providers and cus...
Technology has opened new encounters and opportunities for the criminal justice system. There are so many new practices of criminal activity, such as computer crimes. There are different types of computer crimes that many people become victims of every day. Computer crime is any crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target ("Computer Crime: Chapter 2: What Are the Crimes?", n.d.). Crimes such as data diddling, pump and dump, social engineering and spoofing are computer crimes. Even though these crimes are difficult by privacy issues, the new technology has made investigations and prosecutions well organized and effective. Though views are different on the pros and cons of specific technological changes in the criminal justice system, there is an agreement the system has changed affectedly ("Effects of Technology in Criminal Justice | eHow", n.d.).
The purpose of preserving the data is to ensure that it can be utilized in court. If the evidence is not properly handled and protected, it might be hard for it to be admitted in the legal actions against the criminals. It is at the heart of computer forensics to collect, document, preserve and interpret the computer data. The aim of performing computer forensics is to determine who was responsible for an activity in a digital environment through a procedural investigation. In preserving the digital data, the investigators use different technologies to get access to and analyze the data in the computer systems. Preservation of data also relates to how the official data is, by analysis using various techniques and aspects. This practice needs an advanced expertise that is not conversant with the regular system users and the system support
In conclusion, I understand in digital forensics when copying a bit by bit of a hard drive the examiner must use a write blocker, either software or hardware to avoid possibility of accidentally damaging the evidence contents. After imaging is completed the forensic examiner will have a generated hash value of the bit by bit copy of the evidence hard drive. This hash value (dіgitаl fіngerprіnt) is important to digital forensic because it shows the integrity of all evidence is maintained and to avoid tampering or spoliation. So my question is this, how can we say the integrity of the client's forensic image evidence is not tainted when we know for a fact that the client's computer was filled with malware infections (Trojan)? In my opinion by the time the examiner started investigating the client's hard drive all the
The use of computers in homes, schools, offices, and other places has increased in the past few years due to technological developments. As computers have become important components of modern communication, their increased use has also led to the emergence of computer crimes. Computer crimes basically involve the use of a computer system to carry out an illegal activity. In attempts to lessen the frequency and impact of computer crimes, law enforcement agencies use computer forensic to investigate these offenses. Actually, computer crimes are governed by specific laws and dealt with through conducting a computer forensic investigation (Easttom & Taylor, 2011, p.337). Notably, a computer forensic investigation is usually carried out through the use of computer forensic tools, which help in collection of evidence based on the specific offense.
Live acquisition: The future of data acquisitions is shifting toward live acquisitions because of the use of disk encryption with newer operating systems (OSs). In addition to encryption concerns, collecting any data that’s active in a suspect’s computer RAM is becoming more important to digital investigations. The processes and data integrity requirements for static and live acquisitions are the same. The only shortcoming with live acquisitions is not being able to perform repeatable processes, which are critical for collecting digital evidence.
What did they do ? Before we talk about it any further, we have to know some definitions that we use in digital forensics and digital evidence, not only two of them but the others too. This chapter will explain about it . Before we talk about it any further, we have to know the definition of what we are talking about. In the introduction we already know what digital forensic and digital evidence shortly are. In this chapter, we will more explore what they are, and some state that we found when we search about digital forensic and digital evidence. Computer forensics is a broad field and applied to the handling of crimes related to information technology. The goal of computer forensic is to securing and analyzing digital
The biggest challenge investigators face and who is involved with high tech crime is the fast-paced constant evolving nature of technology. When companies come out with new devices or new versions of old devices which is almost all the time, and those who gather digital evidence must remain current to be able to locate and preserve all potential evidence. As technology evolves the capacities of these devices will rapidly increase while their form factor grows continually smaller. Investigators must preserve digital evidence to make sure it is suitable for presentation in court as well. Investigators must first never change a crime scene or alter evidence. It is their goal to document and preserve the scene exactly as it was when the crime occurred. Extreme caution and care is needed because the mere act of documenting or cataloging a crime scene means that investigators are interacting with the scene. The second concern is the physical fragility of the evidence. Care must be taken to keep items from getting wet, stepped on etc, this can also be applied to digital evidence. Investigators have been able to examine hard disk drives that have been through fires because the drives are usually air and water tight and impervious to temperatures into the thousands of degrees. The third issue is that digital evidence can be lo...
In our modern society, computers and other digital devices are becoming ubiquitous. In the late 1970’s the number of crimes that involved digital devices and computers has been increasing rapidly. As a result of that, computer experts specified the need for permanently improving digital forensic tools and practices.
Computer crime or Cyber Crime is defined as any type of crime that involves or regards a computer or computer network. Cyber Crime mainly means that the computer may be used as a tool in the commission of the crime or the computer may be the main target of the criminal’s crime. The rapid growth of technology and gadgets as well as the further de...