Computer Forensics

887 Words2 Pages

Computer Forensics Often, it is not how much do you know to be the truth but what you can prove. In the court of law, cases can be lost due to the lack of evidence amongst other reasons. Those responsible to investigate wrongdoings or crimes must do so diligently. It is their legal and ethical duty to execute their job with professionalism and a high level of competency. Furthermore, society depends on investigators or detectives to put forth the maximum effort in solving crimes and do so in a fashion where the enforcement of established standards is not compromised. Cybercrimes are no different from crimes that we have become accustomed to hear about. These sorts of crimes often create conglomerate chaos and the damages can …show more content…

There must be a legislative action to engage, prosecute, and defeat the culprits. In comes this word, “forensics” which alone means to bring to the court. Any information systems, network manager, or administrator should understand what computer forensics or digital forensics entails. Through computer forensics, scientific knowledge is analyzed and presented as evidence in the court of law. The recovery of latent evidence from a crime scene is the primary goal of forensics. This sort of evidence can be in a form of fingerprints or DNA to files on a hard drive (US-Cert, …show more content…

There were and still are, many speculations as to the motive behind these attacks. The level of concern because of these cybercrimes was high, it exposed our nation’s vulnerabilities, threatens national security, and devalues our digital infrastructure. Therefore, computer forensics is and should be one of the top priorities of any leader, manager, and users of information systems and networks (US-Cert, 2008). The field of computer forensics is very important as its enhances our ability to practice comprehensive computer forensics. Furthermore, it enhances the overall integrity and survivability of our network infrastructure. Safety and security is everyone’s responsibility in an organization. It is no different when it pertains to network and computer security. An approach known as defense-in-depth is worth knowing in terms of helping the organization. Knowledge of legal and technical aspects of computer forensics is critical to capture vital information should your network becomes compromised (US-Cert,

Open Document