While Biometrics have to do with before event scenarios, Forensics have to do with or applies to post-event scenarios. The objective of computer forensics or forensics science is to reconstruct past criminal dealings to assist in a court of law. As mentioned, the method or modes of identification cannot be known before the investigation; therefore, it is after the collection of information that the investigator must determine which methods to use to examine the evidence.
The use of computer forensics - Unlike Biometrics, computer forensics can be applied to any type of crime or disputes. Because of its fluidity, law enforcement agencies are among the first and heaviest users of computer forensics and as a result have frequently been at the front of developments in the field. Computers can reveal crime scenes such as hacking or denial of service (DOs); they may also reveal internet history, evidence from emails, and or documents or other files related to crimes like kidnapping, drug trafficking, fraud, and murder. Moreover, investigators have great interest in information gathered from documents and files, and emails; however, what maybe the most essential to them is the ‘metadata’ associated with the said files. Another use of comput...
... middle of paper ...
...etrieval and reporting phase, investigators may involuntarily reveal privilege documents.
In addition, according to positivearticles.com, “Legal practitioners involved in the case must also have knowledge of computer forensics.” If they are not experience, “they will not be able to cross examine an expert witness”, the website continues. This is not limited to solicitors, barristers, and even judges. They all need to be knowledgeable before undertake these types of cases. Further, not only the computer forensics investigators need to be well verse in the field, they must be able to clearly explain their findings in such a way that everyone involve will understand. Another drawback with computer forensics is that evidence can only be collected once. If there was a mistake or unfinished work, investigators cannot go back and work on the case after submitting a report.
Need Writing Help?
Get feedback on grammar, clarity, concision and logic instantly.Check your paper »
- M7A1 Essay: Psychological Aspects of Digital Forensics This paper will briefly identify and explain the psychological aspects of digital forensics. It will further examine the role of psychological profiling in digital forensic investigations. Lastly, it will examine the various stresses that digital crime investigations places on the digital forensics investigator. Digital forensics is almost like observing someone’s complete psyche, you see that person’s likes and dislikes. You are viewing their hates and loves; you are finding things they don’t want to share with anyone else in the entire world.... [tags: Forensic science, Computer forensics]
957 words (2.7 pages)
- Technical. The expansion of this organization in the cybersecurity arena has established a necessity to construct a digital forensics laboratory to expand the organization’s evolution in the digital forensics field. To achieve this, Nelson, Steuart, and Phillips (2014) articulates that it is imperative to get an account of information systems and software utilized in the critical infrastructure sectors (p. 67). According to the Department of Homeland Security (2014), the nation’s critical infrastructure encompasses the subsequent sectors depicted in Table 1.... [tags: Forensic science, Computer forensics]
1005 words (2.9 pages)
- Computer Forensic Lab Requirements When initially embarking upon the task of defining computer forensic lab requirements, it may seem that the primary focus would reside within the technological portion of the lab simply because the nature of computer forensics is highly technical and complex. However, in reality, it is the structure (physical lab requirements) and the lab policies and processes (many of which are dictated by legal requirements) that actually make a computer forensic lab what it is, rather than simply a building full of high technology equipment and software.... [tags: Computer forensics, Forensic science]
1138 words (3.3 pages)
- Introduction The digital forensics field has become very vital in the last decade due to growth in both the computer and cellular market. Digital forensics covers monitoring a technological device and analyzing it to know the activity on these items. It helps experts to know if the technological item has been hacked or is being monitored elsewhere. The fact that when we do not need something on our device, and we end up deleting it does not mean that an expert hacker cannot trace a copy of what we have deleted.... [tags: Computer forensics, Forensic science, Computer]
1409 words (4 pages)
- Digital Forensics: Potential for Miscarriages of Justice Madhavi Chandra Saladi 706630 ISYS90051 email@example.com Introduction Digitisation has substantially transformed traditional forensic procedures including the way evidences are collected, preserved and produced in the court of Law. Electronic records from digital devices are being accepted in courts as proofs during trials and several digital forensic tools are employed for use by forensic practitioners on a day to day basis within military, law enforcement and government organisations.... [tags: Forensic science, Computer forensics, Conviction]
1184 words (3.4 pages)
- Digital Forensics Sachin Durgaiah University of Texas at Dallas Abstract: This paper starts with the history of Digital Forensics since when it is being used. The paper then moves to the process of digital forensics and its limitation. We shall look into the legal methods of computer forensics and also how to overcome the disadvantages of computer forensics. Introduction: Digital forensics is mainly used in investigating the data found on electronic devices. Digital forensics has its core application in computer crime.... [tags: Forensic science, Computer forensics]
1978 words (5.7 pages)
- In today 's world, people must keep up with technology in order to conduct their daily routines. Technological advances now allow people to remain in the comfort of their homes while they carry out everything from ordering groceries from the store or videoconferencing with someone around the world can be done electronically. Since its beginnings in the 1990s, people use the Internet in their everyday lives, they rely on it for a safe and accurate exchange of information on a global scale. Personal data such as Social Security numbers, credit card numbers, and passwords are constantly traveling from one computer to another.... [tags: Computer forensics, Forensic science, Computer]
1060 words (3 pages)
- Impediments to Business Operations Cyber forensics investigations require law enforcement officials to enter an organization’s information domains and obtain “snapshots” of their information systems pertinent to the onset of the investigation. This generally consists of first securing the system in its current state, and then copying over all relevant files deemed relevant or possibly the hardware itself (Strickland, 2010). Though businesses are legally obligated to surrender information and devices as warranted by the investigation, tensions are inherently created when the devices or information being investigated are critical to business operations.... [tags: Forensic science, Computer forensics, Business]
911 words (2.6 pages)
- The Scientific Sherlock Holmes: Cracking the Case with Science and Forensics James O’Brien Sherlock Holmes and his methods have been criticized since the beginning. A news article titled Every Man His Own Holmes was published in the New York Times in 1894 after the first Holmes story “A Study in Scarlet” swept the public away. In this piece this editor describes the epidemic Holmes has caused: “Everyone knows the exasperating way in which Sherlock Holmes made what he called deductions. If he saw a man with muddy boots, he instantly deduced from that fact a long history of the man’s career, from his cradle to the moment when his boots became muddy.... [tags: Sherlock Holmes, Arthur Conan Doyle, Fingerprint]
1031 words (2.9 pages)
- Developing skills in order to become a successful person involves complicated steps, determination, and good interpretation. A career job continues to stay as an occupation a person remains in and continue to increase in the position level. There may be different certifications, degrees, or work experience needed for a specific career job. A career job should make a person feel excited for another work day. As an individual realizes the rest of their life, each person has different aspects to encounter.... [tags: Forensic science, Fingerprint, Forensics]
879 words (2.5 pages)
- Analysis Of The Movie ' Forrest Gump '
- Chlamydia And Chlamydia Bacteria Infection
- Challenges Faced By A Once Dominant Retail Giant
- Tides, Sun, And Rotation Of The Earth
- Does The Punishment Ever Truly Fit The Crime?
- Vaccination Of Schools Should Make Mandatory Requirements Of Admission That Parents Vaccinate Their Children