The Importance Of Computer Forensics

1810 Words4 Pages

INTRODUCTION
Computer forensics is the practice of collecting, analysing and reporting on digital data in a way that is legally admissible. It can be used in the uncovering and stoppage of crime and in any disagreement where evidence is stored in numerical form. Computer forensics surveys a parallel process to other forensic corrections, and faces similar matters.

(1) Why we need Computer Forensics and the important of gathering and preserving evidences In the current century, almost everyone are using computers and devices with computing capability. For instance, one can send and receive e-mail messages from handheld devices (such as mobile phones, or PDAs), participate in online games simultaneously with other game players over …show more content…

We need to disassemble the device and service it by labelling WARNING. Purpose of doing this process is in order to collect other forensic evidence such as fingerprints, biological samples and DNA from computer systems, digital devices, and electronic media. We need work with crime scene service technicians or trained forensic personnel to analyse such evidence without disturbing the integrity of the digital media. Besides it we need to take photography of the device from maximum corners as possible. In case we find out any evidence in the scene, we need to mark the evidence and document chain of custody, location, and other important details about the seized item. The disconnect and secure the cables of device and look out for media ports and cd/dvd trays for the presence of removable media. Then package the system, and peripheral devices, for transport using laptop bags (if applicable), boxes, or evidence bags. Then the final step, we need to transport the evidence by following these precautions such as …show more content…

There are a multitude of these types of devices, so we will boundary our discussion to just a few, including the SD, the MMC semiconductor cards, the micro-drives, and the universal serial bus (USB) tokens. The SD cards range in size from a few megabytes (MB) to several gigabytes (GB), and the USB tokens can range from a few MBs to multiple GBs. Furthermore, to seizing and assembling the memory devices, you also must collect the power leads, cables, and any cradles that exist for the PDA. Spreading the enquiry process further, it is imperative that you collect all the types of data consisting of both volatile and dynamic information. Consequently, it is imperative that you give the volatile information importance while you collect evidence. The reason for giving this information priority is because anything that is classified as volatile information will not survive if the machine is powered off or reset. Once the information has been captured, it is imperative that the PDA be placed into an evidence bag and kept at stable power support

Open Document