In today 's world, people must keep up with technology in order to conduct their daily routines. Technological advances now allow people to remain in the comfort of their homes while they carry out everything from ordering groceries from the store or videoconferencing with someone around the world can be done electronically. Since its beginnings in the 1990s, people use the Internet in their everyday lives, they rely on it for a safe and accurate exchange of information on a global scale. Personal data such as Social Security numbers, credit card numbers, and passwords are constantly traveling from one computer to another. With security measures in place to protect this sort of information online, most people feel safe on the Internet and trust that their personal information will remain confidential. Unfortunately, criminals have adapted to advancements in technology and as a result of it a vast number of people are becoming vulnerable of crimes committed over the Internet. Thus there is now an increasing demand for computer forensics and their use of live box and dead box analysis.
According to AVM Technology, “computer forensics or digital forensics refers to the collection of evidence from digital computers, laptops, smart phones, and memory storage devices. This collection process must be performed utilizing a sound methodology so that the evidence could be admissible in a legal setting (2016)”. Failure to follow proper procedures may affect the admissibility and reliability of digital evidence. A computer forensics expert can recover computer evidence even if it has been hidden, encrypted, or deleted. A forensics expert must conduct the analysis in a manner that will preserve, identify, extract, document and interpret compu...
... middle of paper ...
...hain-of-custody reasons and may be needed in litigation. Correspondingly, Cummings’ research shows that, “Binary forensics can be used to identify behavioral capabilities of a specific piece of software (2008)”. This is an excellent way for the computer forensic to determine the who, what, when, where, why, and how of a specific application or piece of malware. Furthermore, the computer forensic is provided with the means to explain to the jury what it is that the suspect did to make him or her guilty.
Live-box computer forensics should now play a role in each and every computer forensic investigation. The runtime information found in memory could be critical to many types of investigations. Dead-box and live-box forensics are complementary. When they are used together, the investigator will gain a more complete set of evidence for any cyber investigation.
Need Writing Help?
Get feedback on grammar, clarity, concision and logic instantly.Check your paper »
- Computer Forensic Lab Requirements When initially embarking upon the task of defining computer forensic lab requirements, it may seem that the primary focus would reside within the technological portion of the lab simply because the nature of computer forensics is highly technical and complex. However, in reality, it is the structure (physical lab requirements) and the lab policies and processes (many of which are dictated by legal requirements) that actually make a computer forensic lab what it is, rather than simply a building full of high technology equipment and software.... [tags: Computer forensics, Forensic science]
1138 words (3.3 pages)
- Both computer forensic or forensic science and Biometrics sometimes may apply same identification methods; however, they do so for different purposes. Computer forensics or forensics science is based on history and a forensic investigator does not just pick a method in advance. In other words, forensics investigators are unaware of what they will find as evidence. In addition, the manner in which forensics tools and evidence are handled may have critical implications, which can make or break a case.... [tags: Forensic science, Computer forensics]
768 words (2.2 pages)
- Technical. The expansion of this organization in the cybersecurity arena has established a necessity to construct a digital forensics laboratory to expand the organization’s evolution in the digital forensics field. To achieve this, Nelson, Steuart, and Phillips (2014) articulates that it is imperative to get an account of information systems and software utilized in the critical infrastructure sectors (p. 67). According to the Department of Homeland Security (2014), the nation’s critical infrastructure encompasses the subsequent sectors depicted in Table 1.... [tags: Forensic science, Computer forensics]
1005 words (2.9 pages)
- M7A1 Essay: Psychological Aspects of Digital Forensics This paper will briefly identify and explain the psychological aspects of digital forensics. It will further examine the role of psychological profiling in digital forensic investigations. Lastly, it will examine the various stresses that digital crime investigations places on the digital forensics investigator. Digital forensics is almost like observing someone’s complete psyche, you see that person’s likes and dislikes. You are viewing their hates and loves; you are finding things they don’t want to share with anyone else in the entire world.... [tags: Forensic science, Computer forensics]
957 words (2.7 pages)
- Digital Forensics Sachin Durgaiah University of Texas at Dallas Abstract: This paper starts with the history of Digital Forensics since when it is being used. The paper then moves to the process of digital forensics and its limitation. We shall look into the legal methods of computer forensics and also how to overcome the disadvantages of computer forensics. Introduction: Digital forensics is mainly used in investigating the data found on electronic devices. Digital forensics has its core application in computer crime.... [tags: Forensic science, Computer forensics]
1978 words (5.7 pages)
- Introduction The digital forensics field has become very vital in the last decade due to growth in both the computer and cellular market. Digital forensics covers monitoring a technological device and analyzing it to know the activity on these items. It helps experts to know if the technological item has been hacked or is being monitored elsewhere. The fact that when we do not need something on our device, and we end up deleting it does not mean that an expert hacker cannot trace a copy of what we have deleted.... [tags: Computer forensics, Forensic science, Computer]
1409 words (4 pages)
- Digital Forensics: Potential for Miscarriages of Justice Madhavi Chandra Saladi 706630 ISYS90051 email@example.com Introduction Digitisation has substantially transformed traditional forensic procedures including the way evidences are collected, preserved and produced in the court of Law. Electronic records from digital devices are being accepted in courts as proofs during trials and several digital forensic tools are employed for use by forensic practitioners on a day to day basis within military, law enforcement and government organisations.... [tags: Forensic science, Computer forensics, Conviction]
1184 words (3.4 pages)
- ... Unintentionally, the ability to retrieve critical data that may be useful to identify and analyze a security incident, may be affected (US-Cert, 2008). The complexity of computer forensics and the ability to retrieve data have increased exponentially over the years. Furthermore, situational awareness by everyone in organizations is becoming more and more a focal point, it must be practiced consistently, and become second nature. Cyber-readiness is everyone’s responsibility and it must be achieved expeditiously.... [tags: Computer security, Information security, Security]
854 words (2.4 pages)
- ... al, pp. 15-16). Ultimately these issues can lead investigations to be more difficult for investigators and businesses alike. Though a user may have the best intentions of restoring a device to a previous state, or engaging in business as usual, their actions may complicate an investigation further. Therefore, proactive policies for incident response are preferable, so that employees throughout an organization are aware of the proper protocol when an investigation arises. Impediments Caused by the Time Consumed during an Investigation Though the process of documenting evidence is aimed at being as unobtrusive as possible, copying over large batches of data - i.e.... [tags: Forensic science, Computer forensics, Business]
911 words (2.6 pages)
- “Computer forensics is the specialized practice of investigating computer media for the purpose of discovering and analyzing available, deleted, or "hidden" information that may serve as useful evidence in a legal matter. “ (Steen, Hassell 2004) Computer forensics has become a very important factor of criminal investigations. Since computers have become mainstream the need for a science that will deal with the technology has become an issue for the judicial and legal system. Some of the areas computer forensics may be utilized are: § Copyright infringement § Industrial espionage § Money laundering § Piracy § Sexual harassment § Theft of intellectual propert... [tags: Technology, Science, Computer Applications]
322 words (0.9 pages)