Verified Document

Computer Forensics: Generally, Forensics Can Be Described Essay

Computer Forensics: Generally, forensics can be described as the process of using scientific knowledge in the gathering, evaluation, and presentation of evidence to the courts. Since forensics deal with the presentation of evidence to the courts, it basically deals with the analysis and recovery of hidden evidence. In this case, the hidden evidence may be in several forms including fingerprints, blood stains, and DNA evidence. On the other hand, computer forensics can be described as the discipline that merges fundamentals of law and computer science to gather and evaluate data from computer systems in forms that are admissible as evidence within the courts. These computer systems include wireless communications, computer networks, and storage devices. Computer forensics has emerged as a new discipline and field in the recent past due to the recent increase in cyber terrorism. Consequently, there is minimal standardization and uniformity across the computer forensics industry and the courts.

Importance of Computer Forensics:

The main goal of this process is to conduct structured analysis while preserving a well-documented series of evidence to determine the actual occurrences on a computer system and the responsible person or people. While this discipline has only developed in the recent past, it has become a renowned field of scientific expertise that involves various processes, necessary coursework, and certification.

Computer forensics is a vital field of scientific research because it helps in preserving important evidence that is admissible in a...

Through computer forensics, an organization can acquire important information regarding its network and help in the identification and prosecution of intruders of the network. Secondly, computer forensics can help in saving an organization's finances, especially with the increase in expenditures towards computer and network security. This field saves an organization's expenditures by reducing the money spent on intrusion-detection and vulnerability-assessment programs.
The Process Involved in Computer Forensics:

Computer forensics basically involves the use of various important processes since forensic investigators need to follow an established set of procedures. The first process or phase in this procedure involves the isolation of the specific computer to ensure that it cannot be tainted accidentally. The isolation of the computer helps in preserving the original media and data through the secure storage of the computer hard drive. However, a forensic image or copy of the original media is made and used for conducting analysis in contrast with the original media.

The second process is the identification procedure with which possible containers of the computer-related evidence is conducted. In most cases, this involves the use of log files, floppy disks, and hard disks since the containers are not primarily regarded as evidence itself. The identification stage includes the discovery of data and information that is relevant to the specific situation through various ways like conducting keyword searches (Hailey,…

Sources used in this document:
References:

"Computer Forensics." (2008). U.S.-CERT. Retrieved from United States Computer Emergency

Readiness Team website: http://www.us-cert.gov/reading_room/forensics.pdf

Hailey, S. (2003, September 19). What is Computer Forensics? Retrieved March 3, 2012, from http://www.csisite.net/forensics.htm

"New Jersey Regional Computer Forensic Laboratory." Partner in America's Premier Digital
Forensic Laboratory Network. Retrieved from U.S. Department of Justice -- Federal Bureau of Investigation website: http://www.njrcfl.org/downloads/documents/NJRCFLbrochure.pdf
Cite this Document:
Copy Bibliography Citation

Related Documents

Computer Forensics for Preventing Email
Words: 4655 Length: 17 Document Type: Capstone Project

i.e. modifying the domain name system. 7. DNS-Based Phishing ("Pharming"): This offense is based on interference in the domain name searching process by modifying the domain name resolution sending the user to a different IP address. 8. Content-Injection Phishing: The phisher introduces fraudulent content into a legitimate website. 9. Data Theft: Malicious code that collects sensitive information stored within the machines in which it is installed. 10. Man-in-the-Middle Phishing: The phisher takes a

Computer Surveillance: Qualitative Attempt to
Words: 4976 Length: 19 Document Type: Term Paper

Studies suggest that even "more "omniscient" technology is likely to be developed" in the near future (Lyon, 2002). Cookies were perhaps the first form of internet surveillance, developed in 1994 as a means for websites to track visitors logging in so they could provide more optimal service (Lyon, 2002). Now cookies have transformed the shape of communication and have further advanced the ability of criminals to survey individual user functions

Benchmarking Key Loggers for Gathering Digital Evidence on Personal...
Words: 8600 Length: 18 Document Type: Multiple Chapters

Benchmarking Keyloggers for Gathering Digital Evidence on Personal Computers Keyloggers refers to the hardware or software programs, which examine keyboard and mouse activity on a computer in a secretive manner so that the owner of the computer is not aware that their actions are monitored. The keyloggers accumulate the recorded keystrokes for later recovery or remotely convey it to the person employing them. Keyloggers aimed to serve as spyware and currently

Digital Forensics
Words: 1974 Length: 6 Document Type: Research Paper

Digital forensic can be described as a branch of forensic science surrounding the recovery as well as investigation of materials which are found within digital devices, in many occasion regarding computer crime. Originally the term was always used as a synonym for computer forensics; however it has spread out to be used in investigations of the entire devices with capability of storing digital data. Having its grounds in the personal

Cyber Crime Forensics
Words: 2623 Length: 9 Document Type: Term Paper

Cybercrime has become a serious problem in the world we live in. The abundance of personal computers that are readily available at relatively low prices has spawned the growth in Cybercrime all over the globe. As a result, law enforcement agencies have developed cybercrime forensics which is designed to track down those that are responsible for cyber crimes. The purpose of this discussion is to analyze this subject and discuss

Forensic Accounting in Practice
Words: 2031 Length: 6 Document Type: Term Paper

roles of forensic accountants in preventing and detecting fraud within a business community. The paper highlights the requisites and basic responsibilities of a forensic accountant. The paper also makes references on the special cases where forensic accountants have assisted in fraud detection and prevention. Overview of Forensic Accounting Forensic accounting is the specialty area of accounting used to train an individual to develop the special accounting skills to detect and prevent

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now