Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
The importance of handling digital evidence
Computer forensic investigation cases
Computer forensic investigation cases
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Recommended: The importance of handling digital evidence
Technology is constantly changing, and as the capabilities change, so do the issues in Forensic information technology (FIT). FIT is defined as the scientific use or application of information technology (IT) that is used to generate and present digital evidence to be used in courts, legal or other formal proceedings (Volonio). While the use of technology helps get things done faster, it also can present many issues if the proper procedures and tools are not used and followed. An existing issue in FIT is computer forensics, in regards to preserving digital evidence and effectively conducting a computer forensics investigation. Computer forensics can be defined as the who, what, when, and how of digital (electronic) evidence and how techmology is used to preserve, authentic, and analyze the evidence collected (citation 17utah). If obtained evidence is not handled propely, this could jepoeradize its reliability when being admitted into court. It is important to identify the issues, possible solutions, and the type of technology that is used in computer forensics, especially during a computer forensic investigation. This paper will provide an insight to the existing issues in FIT such as computer forensics, with emphasis on preserving digital(electronic) evidence and the issue of effectively aquiring, authenticating, and analyzing retrieved information during a forensic investigation. 17utah pg. 10-11 Introduction Computer forensics is the application of analytical techniques on digital media after a computer security incident has occurred. Its goal is to identify exactly what happened on a digital system and who was responsible through investigative procedure. Computer forensics involves the preservation, identification, extractio... ... middle of paper ... ...d electronic discovery: The new management challenge. Computers & Security, 25(2), 91-96. doi:10.1016/j.cose.2006.01.002 Kruse, W. G., & Heiser, J. G. (2001). Computer forensics: Incident response essentials. Boston, MA: Addison-Wesley, p.3-15. Mercer, L. D. (2004). Computer Forensics Characteristics and Preservation of Digital Evidence. FBI Law Enforcement Bulletin, 73(3), 28-32. Volonino, L., Anzaldua, R., & Godwin, J. (2007). Computer forensics: Principles and practices. Upper Saddle River, N.J: Pearson/Prentice Hall. Wall, C., & Paroff, J. (2004). Cracking the Computer Forensics Mystery. Utah Bar Journal, 17(7), 10-17. Retrieved from http://heinonline.org. Warren G. Kruse II and Jay G. Heiser. Computer Forensics: Incident Response Essentials. Addison Wesley, Boston 2001, p. 2. Wolfe, D. B. (2003, January). Computer forensics. Computers & Security. p. 26-28
Forensics investigations that require the analyzation and processing of digital evidence can be influenced both positively and negatively by a number of outside sources. In this paper, we will explore how physical security plays a role in forensics investigations activities. We will start by examining how physical and environmental security might impact the forensics investigation process. Next, we will discuss the role that physical and logical security zones play in supporting effective forensics activities. We will illustrate how centralized and decentralized physical and environmental security affects the forensics professional’s approach toward the investigation. Lastly, we will evaluate some potential areas of risk related to the physical security of our case study organization, Widget Factory, identified in Attachment 1.
Gardner, T. J., & Anderson, T. M. (2013). Criminal evidence: Principles and cases (8th ed.).
Gardner, T. J., & Anderson, T. M. (2013). Criminal evidence: Principles and Cases (8th ed.).
Lyman, D. Michael; Criminal Investigation, The Art and Science; 3rd edition, 2002 Prentice Hall. Pgs. 188-200.
Technologies are advancing in today's world where more information is being generated, stored and distributed through digital gadgets. This requires investigators and forensic expert to increase the use of digital evidence gathering as a tool to fight against cyber-crime (International competition network, n.d.).
There is a wide range of Linux forensic software available. There are single tools like file carvers, or there are comprehensive collections of tools. In the following, some of the most popular Linux forensic tools are described. The focus is put on The Sleuth Kit because it is organized according to the different filesystem layers. This provides an interesting insight on how forensics is done on filesystems.
The last type of evidence I will discuss are documents. Everyone has a different handwriting and different characteristics that make it unique. Computers are also unique in the way they type and print out things. Document examiners can look over these and establish the similarities in the handwriting and computer forensic specialists can extract logs and other data from most devices.
“Advance in Forensics Provide Creative Tools for Solving Crimes.” www.ctcase.org. Np. n.d. Web. 17 March 2014.
[2] F. Dellutri, V. Ottaviani, and G. Me, “Forensic acquisition for windows mobile pocketpc,” in Proc. of the WSHPCS, HPCS 2008, Nicosia, Cyprus June 3-6, 2008, pp. 200–205.
The use of computers in homes, schools, offices, and other places has increased in the past few years due to technological developments. As computers have become important components of modern communication, their increased use has also led to the emergence of computer crimes. Computer crimes basically involve the use of a computer system to carry out an illegal activity. In attempts to lessen the frequency and impact of computer crimes, law enforcement agencies use computer forensic to investigate these offenses. Actually, computer crimes are governed by specific laws and dealt with through conducting a computer forensic investigation (Easttom & Taylor, 2011, p.337). Notably, a computer forensic investigation is usually carried out through the use of computer forensic tools, which help in collection of evidence based on the specific offense.
In our modern society, computers and other digital devices are becoming ubiquitous. In the late 1970’s the number of crimes that involved digital devices and computers has been increasing rapidly. As a result of that, computer experts specified the need for permanently improving digital forensic tools and practices.
What did they do ? Before we talk about it any further, we have to know some definitions that we use in digital forensics and digital evidence, not only two of them but the others too. This chapter will explain about it . Before we talk about it any further, we have to know the definition of what we are talking about. In the introduction we already know what digital forensic and digital evidence shortly are. In this chapter, we will more explore what they are, and some state that we found when we search about digital forensic and digital evidence. Computer forensics is a broad field and applied to the handling of crimes related to information technology. The goal of computer forensic is to securing and analyzing digital
Gaensslen, R. E., Harris, H A., & Lee, H. (2008). Introduction to Forensic Science and Criminalistics. New York, NY: The McGraw-Hill Companies, Inc. .
The biggest challenge investigators face and who is involved with high tech crime is the fast-paced constant evolving nature of technology. When companies come out with new devices or new versions of old devices which is almost all the time, and those who gather digital evidence must remain current to be able to locate and preserve all potential evidence. As technology evolves the capacities of these devices will rapidly increase while their form factor grows continually smaller. Investigators must preserve digital evidence to make sure it is suitable for presentation in court as well. Investigators must first never change a crime scene or alter evidence. It is their goal to document and preserve the scene exactly as it was when the crime occurred. Extreme caution and care is needed because the mere act of documenting or cataloging a crime scene means that investigators are interacting with the scene. The second concern is the physical fragility of the evidence. Care must be taken to keep items from getting wet, stepped on etc, this can also be applied to digital evidence. Investigators have been able to examine hard disk drives that have been through fires because the drives are usually air and water tight and impervious to temperatures into the thousands of degrees. The third issue is that digital evidence can be lo...
With criminals conducting clever and well thought out plans, forensic science is now become an essential tool for investigating crime scenes. With new technological advancements, it should be thought that this form of evidence is the only most reliable source there is. But many have said otherwise. It is a technique that is used to convict a criminal as well as protecting the innocent. The many skills and areas of forensics help the reliability of an investigation as each expert area are assigned professionally.