Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
Advantages and disadvantages of digital forensics
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Recommended: Advantages and disadvantages of digital forensics
According to a recent research conducted by renowned Security Professionals, the major causes of data breach can be categorized into:
3.1 MALICIOUS ATTACKS
Malware and hacking are the most potent and long-established causes of security breaches. Malware attacks and data loss are growing concerns for businesses around the world.
To give a clear example, Zeus Trojan was modeled to steal financial information from the system influenced by it. By means of website monitoring and key logging, the malware identified the keystrokes used to log in and swiped information.
3.2 HUMAN FACTOR
It is not entirely accurate to say that external factors are solely responsible for security breaches. It has been found that 35% of the major data breaches are
…show more content…
CONCLUSION
Sophisticated cyber attacks need sophisticated cyber security. With the expansion in the number, cost and other devastating impacts of data breach, digital forensics render a major role in the investigation and control of information security breaches.
So, what role does forensics play in exploring and minimizing the number of data breaches and attacks?
7.1 BETTER THREAT DETECTION
Realizing the adverse and damaging effects of modern security breaches, forensics play a major role in detecting and preventing threats before security breaches occur. This can save a lot of pressure that would have arisen if the breach had taken place. That’s why notable companies hire a forensic team to prevent being the victims of security attacks. 7.2 JUSTICE TO THE VICTIM ORGANIZATION AND PENALTY TO CRIMINALS
Using powerful digital forensic tools like Encase, Wireshark, SANS Investigative Forensics Toolkit, etc to analyze mountains of data quickly and efficiently, proficient forensic experts can track and trace the data breaches and save a victim organization from major loss.
7.3 DATA RECOVERY
Data recovery tools like BitRecover Data Recovery Software, TestDisk and Scalpel can be used to recover lost or tampered
Issa utilizes statistics to suggest ideas. He says, “The Office of Personnel Management’s security breach resulted in the theft of 22 million Americans’ information, including fingerprints, Social Security numbers, addresses, employment history, and financial records” (Issa). Issa also adds that, “The Internal Revenue Service’s hack left as many as 334,000 taxpayers accounts compromised‑though just this week, the IRS revised that number to o...
Digital Forensic is the process of uncovering and interpreting electronic data that can be used in a court of law. It requires a set of standards to show how the information that is gathered, preserve, and analyzed is strictly followed. The analysts need to understand the evolution of the current technology and how it will impact how they gather their information. The investigator is able to uncover evidence and analyze it to gain the understanding of the motives, crime, and the criminal’s identity to help solve the crime. As computers and technology continue to become a part of our everyday lives, the cyber realm contains a growing realm for evince in all types of criminal investigations (Cummings, 2008) Digital forensics is a way to connect information security and law enforcement. It ensures that the digital evidence is collected in a way that it can make it into the courts in an unhampered or uncontaminated way (Dlamini, M., Eloff, J. & Eloff, M., 2009).
Maras, M. (2012). Computer Forensics: Cybercriminals, Laws, and Evidence. Sudbury. Jones and Bartlett Learning LLC.
When it comes to cyber crimes we can’t put a face to the crimes being committed, it’s easier to find ways to prevent hackers from gaining access to important data than searching and putting them in handcuffs. Traditional police theories will not work for cyber crimes, so cyber police theories need to be developed.
Computer crime has been an issue since the beginning of computers. Wherever there is something good, there is always someone who takes advantage of it. This can be seen in cyber crime, which has been on the rise in recent years. According to the Los Angeles Times, the median cost of computer crime to a company per year has risen from $3.8 million dollars in 2010 to $5.9 million. (Rodriguez, 2011) This suggests that computer crime is becoming an even bigger hazard to companies. A recent example of this was the data breach committed against Target in 2013.
When I was hired to teach math at Patrick Henry High School I had no idea of the things to come. Being a math instructor, I somehow was drafted to be part of the CERT at Patrick Henry. You see, CERT stands for Computer Emergency Response Team and as a team member I have certain responsibilities once a “computer emergency” occurs. While I don’t want to spend any time defining what constitutes a “computer emergency”, I will explain the current situation in which I find myself involved.
...n and analytical evidence like DNA, coatings, fluids, serology, etc are significant things that help in collecting each pieces of data or event from the crime spot to identify the criminals. The three basic deeds performed by it are helping law enforcement, highly reducing the occurrence of wrongful convictions and enhancing of homeland security of the nation.
1.0 Incident: The Arby’s fast-food chain recently experienced a data breach. The breach introduced malicious software that was similar to other recent point-of-sales malware, onto the company’s payment card systems at hundred of its corporate locations across the nation. Arby’s would not inform the public of how long the malware was thought to have been on their systems, however, it is estimated to transpire some time between October 25, 2016 and January 19, 2017. 2.0 Analysis: According to the Fast Food Chain Arby’s Acknowledges Breach article, the first clues about a possible breach at the fast-food chain came in a non-public alert delivered by the Payment Solutions for Credit Unions (PSCU), who obliges to over eight hundred credit unions.
Now let’s look at few tools that are used in the field of digital forensics [1] like disk and data capturing tools, Internet analysis tools, hidden file viewers, deleted email recovery and analysis tools and network traffic analysis tools.
In conclusion, computer crimes have increased in the recent past because of the proliferation of these devices due to technological advancements. This has in turn contributed to the emergence of computer forensics, which involves the use of various processes and tools to gather evidence that is admissible in a court. There are various types of computer forensic tools or programs with different features, costs, and areas of effectiveness. Similarly, there are various computer experts for various computer crime scenarios. Since these experts are only suitable for varying computer crime scenarios, the hourly costs of hiring them differ based on the specific details of the case.
Presently, because the importance of digital forensics it has its own field of computer forensic expertise, training and certification.
What did they do ? Before we talk about it any further, we have to know some definitions that we use in digital forensics and digital evidence, not only two of them but the others too. This chapter will explain about it . Before we talk about it any further, we have to know the definition of what we are talking about. In the introduction we already know what digital forensic and digital evidence shortly are. In this chapter, we will more explore what they are, and some state that we found when we search about digital forensic and digital evidence. Computer forensics is a broad field and applied to the handling of crimes related to information technology. The goal of computer forensic is to securing and analyzing digital
The biggest challenge investigators face and who is involved with high tech crime is the fast-paced constant evolving nature of technology. When companies come out with new devices or new versions of old devices which is almost all the time, and those who gather digital evidence must remain current to be able to locate and preserve all potential evidence. As technology evolves the capacities of these devices will rapidly increase while their form factor grows continually smaller. Investigators must preserve digital evidence to make sure it is suitable for presentation in court as well. Investigators must first never change a crime scene or alter evidence. It is their goal to document and preserve the scene exactly as it was when the crime occurred. Extreme caution and care is needed because the mere act of documenting or cataloging a crime scene means that investigators are interacting with the scene. The second concern is the physical fragility of the evidence. Care must be taken to keep items from getting wet, stepped on etc, this can also be applied to digital evidence. Investigators have been able to examine hard disk drives that have been through fires because the drives are usually air and water tight and impervious to temperatures into the thousands of degrees. The third issue is that digital evidence can be lo...
This book is relative to digital forensics because it demonstrates the broad scope of cyber and computer crimes. The crimes discussed consist of hacking, financial fraud, child exploitation, phreaking, identity theft, etc. The various methods used by criminals to commit said crimes is also discussed and how these methods are evolving and becoming more efficient. The book is relevant because it demonstrates how expansive cybercrime, computer crime, and digital forensics actually are. The book discusses hacking and although that seems to be a straightforward topic, there are various types of hackers and methods that they use that re
Security is very important for many different reasons. A nation must insure their safety as a whole, as well as the persons living in the nation. It is equally important that the nation's economy is stable and growing. Security is something that every nation deals with, in many different ways. It is a way that nations come to together and create allies. However, it is also a way for nations to create enemies. There are a variety of concerns that require attention around the world including state security, human security, and economic security. Political and economic relations impact each of these security issues different proven by history and present events around the world.