Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
the importance of handling digital evidence
computer forensic investigation cases
computer forensic investigation cases
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Recommended: the importance of handling digital evidence
Technology is constantly changing, and as the capabilities change, so do the issues in Forensic information technology (FIT). FIT is defined as the scientific use or application of information technology (IT) that is used to generate and present digital evidence to be used in courts, legal or other formal proceedings (Volonio). While the use of technology helps get things done faster, it also can present many issues if the proper procedures and tools are not used and followed. An existing issue in FIT is computer forensics, in regards to preserving digital evidence and effectively conducting a computer forensics investigation. Computer forensics can be defined as the who, what, when, and how of digital (electronic) evidence and how techmology is used to preserve, authentic, and analyze the evidence collected (citation 17utah). If obtained evidence is not handled propely, this could jepoeradize its reliability when being admitted into court. It is important to identify the issues, possible solutions, and the type of technology that is used in computer forensics, especially during a computer forensic investigation. This paper will provide an insight to the existing issues in FIT such as computer forensics, with emphasis on preserving digital(electronic) evidence and the issue of effectively aquiring, authenticating, and analyzing retrieved information during a forensic investigation. 17utah pg. 10-11 Introduction Computer forensics is the application of analytical techniques on digital media after a computer security incident has occurred. Its goal is to identify exactly what happened on a digital system and who was responsible through investigative procedure. Computer forensics involves the preservation, identification, extractio... ... middle of paper ... ...d electronic discovery: The new management challenge. Computers & Security, 25(2), 91-96. doi:10.1016/j.cose.2006.01.002 Kruse, W. G., & Heiser, J. G. (2001). Computer forensics: Incident response essentials. Boston, MA: Addison-Wesley, p.3-15. Mercer, L. D. (2004). Computer Forensics Characteristics and Preservation of Digital Evidence. FBI Law Enforcement Bulletin, 73(3), 28-32. Volonino, L., Anzaldua, R., & Godwin, J. (2007). Computer forensics: Principles and practices. Upper Saddle River, N.J: Pearson/Prentice Hall. Wall, C., & Paroff, J. (2004). Cracking the Computer Forensics Mystery. Utah Bar Journal, 17(7), 10-17. Retrieved from http://heinonline.org. Warren G. Kruse II and Jay G. Heiser. Computer Forensics: Incident Response Essentials. Addison Wesley, Boston 2001, p. 2. Wolfe, D. B. (2003, January). Computer forensics. Computers & Security. p. 26-28
Genge, N. E. The Forensic Casebook: the Science of Crime Scene Investigation. New York: Ballantine, 2002. Print.
Forensics investigations that require the analyzation and processing of digital evidence can be influenced both positively and negatively by a number of outside sources. In this paper, we will explore how physical security plays a role in forensics investigations activities. We will start by examining how physical and environmental security might impact the forensics investigation process. Next, we will discuss the role that physical and logical security zones play in supporting effective forensics activities. We will illustrate how centralized and decentralized physical and environmental security affects the forensics professional’s approach toward the investigation. Lastly, we will evaluate some potential areas of risk related to the physical security of our case study organization, Widget Factory, identified in Attachment 1.
Gardner, T. J., & Anderson, T. M. (2013). Criminal evidence: Principles and Cases (8th ed.).
The last type of evidence I will discuss are documents. Everyone has a different handwriting and different characteristics that make it unique. Computers are also unique in the way they type and print out things. Document examiners can look over these and establish the similarities in the handwriting and computer forensic specialists can extract logs and other data from most devices.
There is a wide range of Linux forensic software available. There are single tools like file carvers, or there are comprehensive collections of tools. In the following, some of the most popular Linux forensic tools are described. The focus is put on The Sleuth Kit because it is organized according to the different filesystem layers. This provides an interesting insight on how forensics is done on filesystems.
“Advance in Forensics Provide Creative Tools for Solving Crimes.” www.ctcase.org. Np. n.d. Web. 17 March 2014.
Lyman, D. Michael; Criminal Investigation, The Art and Science; 3rd edition, 2002 Prentice Hall. Pgs. 188-200.
Forensic Science, recognized as Forensics, is the solicitation of science to law to understand evidences for crime investigation. Forensic scientists are investigators that collect evidences at the crime scene and analyse it uses technology to reveal scientific evidence in a range of fields. Physical evidence are included things that can be seen, whether with the naked eye or through the use of magnification or other analytical tools. Some of this evidence is categorized as impression evidence2.In this report I’ll determine the areas of forensic science that are relevant to particular investigation and setting out in what method the forensic science procedures I have recognized that would be useful for the particular crime scene.
Gardner, T. J., & Anderson, T. M. (2013). Criminal evidence: Principles and cases (8th ed.).
In conclusion, computer crimes have increased in the recent past because of the proliferation of these devices due to technological advancements. This has in turn contributed to the emergence of computer forensics, which involves the use of various processes and tools to gather evidence that is admissible in a court. There are various types of computer forensic tools or programs with different features, costs, and areas of effectiveness. Similarly, there are various computer experts for various computer crime scenarios. Since these experts are only suitable for varying computer crime scenarios, the hourly costs of hiring them differ based on the specific details of the case.
What did they do ? Before we talk about it any further, we have to know some definitions that we use in digital forensics and digital evidence, not only two of them but the others too. This chapter will explain about it . Before we talk about it any further, we have to know the definition of what we are talking about. In the introduction we already know what digital forensic and digital evidence shortly are. In this chapter, we will more explore what they are, and some state that we found when we search about digital forensic and digital evidence. Computer forensics is a broad field and applied to the handling of crimes related to information technology. The goal of computer forensic is to securing and analyzing digital
The biggest challenge investigators face and who is involved with high tech crime is the fast-paced constant evolving nature of technology. When companies come out with new devices or new versions of old devices which is almost all the time, and those who gather digital evidence must remain current to be able to locate and preserve all potential evidence. As technology evolves the capacities of these devices will rapidly increase while their form factor grows continually smaller. Investigators must preserve digital evidence to make sure it is suitable for presentation in court as well. Investigators must first never change a crime scene or alter evidence. It is their goal to document and preserve the scene exactly as it was when the crime occurred. Extreme caution and care is needed because the mere act of documenting or cataloging a crime scene means that investigators are interacting with the scene. The second concern is the physical fragility of the evidence. Care must be taken to keep items from getting wet, stepped on etc, this can also be applied to digital evidence. Investigators have been able to examine hard disk drives that have been through fires because the drives are usually air and water tight and impervious to temperatures into the thousands of degrees. The third issue is that digital evidence can be lo...
Gaensslen, R. E., Harris, H A., & Lee, H. (2008). Introduction to Forensic Science and Criminalistics. New York, NY: The McGraw-Hill Companies, Inc. .
Jost, Kenneth. "Examining Forensics." CQ Researcher Online. N.p., 17 July 2009. Web. 29 Apr. 2014. . How criminals can use photoshop to eliminate evidence
In our modern society, computers and other digital devices are becoming ubiquitous. In the late 1970’s the number of crimes that involved digital devices and computers has been increasing rapidly. As a result of that, computer experts specified the need for permanently improving digital forensic tools and practices.