Top-Rated Free Essay
Preview

Computer Forensics

Good Essays
857 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Computer Forensics
3K
What we know * Computer forensics lab usually conduct a digital forensic analysis * There are many type of computer forensics tool, some are free and some are licensed * Forensics lab usually are restricted to outsider
What we don’t know * How computer forensics preserve their evidence * Overview of computer forensics lab * Cost to build a computer forensics lab
What we need to know * Specific tool that use by computer forensics base on their case * How to build a computer forensics lab with low cost by using open source software * How to properly securing evidence and transporting it for examination at a later time by a digital evidence forensic examiner

Summary
In this PBL 1 we learn about computer forensics lab and how do their handle a crime case. The uptake of technology has been just as widespread in the criminal world as everywhere else. This means that digital forensics is not just about “digital crime” such as hacking. Traditional crime can now be investigated by looking at its digital aspects, for example recreating the movements of a criminal’s mobile phone around a town or someone’s web-based research about the location of a burglary. The discipline of digital forensics involves the knowledge and skills necessary to investigate all types of cybercrime, including fraud, data theft, and identity theft and cyber terrorism. The role of the digital forensic investigator has emerged to investigate these and other crimes.

In this PBL also we need to take 4 examples of computer forensic labs around the world which is Bellevue University - Bellevue, Nebraska forensic lab, Forensic Laboratories - Attorney General - State of California, Forensic Science Division – State Crime Lab – Montana Department, and Crime Labs - Wisconsin Department of Justice. By the observation about this 4 computer forensics lab we can say that how important is computer forensics in our life. The examiners are expert in their jobs especially to catch a Criminals also use a host of electronic media and computers in facilitation of their unlawful activities this is because modern and current technology permits suspects to commit crimes internationally and remotely with variety of digital devices.

Usually computer forensics lab doesn’t need a large space, each of this lab are divided by several group usually in 2 or 3 person and each group are conducted with different several case.
Even some company supplying the examiners’ with mobility equipment to do investigating outside the labs.

We know that data inside the digital devices are important to the examiners preserve digital media in a forensically manner with the aim of identifying, preserving, recovering, analyzing and presenting facts and opinions about the information. This can get by using specific software and hardware.

Computer forensics lab it is not complete without hardware and software and specific tools use for investigations. The hardware are different than normal computer at home because computer use for computer forensic has higher specification such as base unit, processor, memory; optical and hard drive, NIC, and etc. all of this are type of specifications for computer forensic computer. Besides the computer other hardware such as printer, scanner and etc. also need to be something that have higher specifications for investigation purposes.

There is several software that been used in computer forensics lab, mostly open source software and also licensed too depend on the case. Example of the software that been used is such as Forensic Recovery of Evidence Device (FRED), Tableau T335 Forensic Bay Controller, Cellebrite UFED Physical Pro, Guidance Software: EnCase Forensic Edition and many more.
After research about computer forensics lab we can conclude that the field of computer forensics is a very recent form of crime investigation. The introduction of personal computers has given criminals one more tool to use. The method of catching these criminals needed to be developed from nothing. The few individuals and agencies in the late 1980s and early 1990s were instrumental in creating the foundation from which all training and software have been based. With this basic principal for the standards of evidence collection and the software necessary to investigate and preserve this evidence, we have developed a system for proving elements of a crime committed using a computer.

The second challenge faced by computer forensic specialists was the amount of data to be processed. As computer technology advanced to allow the storage of more data, this increased the amount of information a technician had to sort for evidentiary value. The second generation of software responded to this task by assisting in the sorting process so technicians could view files faster by viewing them in groups rather than individually.

A problem that persists through all forensic fields is the length of time it takes to gather evidence; this is no different in computer forensics. Software that aids investigators in the field by quickly looking for predetermined information on suspected computers saves time by narrowing which computers or storage media may contain illicit materials.

The advancements made in the field of computer forensics have adapted well to meet new technology. This has made sure that computer forensics can keep pace with the crimes committed both in type of crimes as well as volume of crimes.

You May Also Find These Documents Helpful

  • Powerful Essays

    272. Newman, R. (2007). Computer Forensics: Evidence Collection and Managment. Boca Raton FL: Taylor & Francis Group. LLC.…

    • 4846 Words
    • 17 Pages
    Powerful Essays
  • Satisfactory Essays

    Iscs 451 Assignment 6

    • 576 Words
    • 3 Pages

    The factors that have limited local law enforcement’s efforts against digital crime are lack of training, lack of diagnostic equipment, lack of management level recognition and support, and a lack of specialized personnel. First off, training is a paramount need for local law enforcement. Many of the officers appointed to computer crimes at the local level do not have the requisite knowledge to deal with these types of crimes. Some of these officers are even put into these roles when they don’t even want to. Also, the lack of training to patrol officers could lead to valuable evidence being inadvertently destroyed. Most local agencies lack the equipment necessary to conduct digital forensics. Many local experts have even been reported to have purchased their own equipment to do their job (Taylor, et. al., 2011). The lack of management support and recognition of computer crime analysis has led to the lack of funding for these local cyber units. With a lack of funding comes a lack of equipment, training, and the ability for personnel to specialize in digital forensics.…

    • 576 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    MGS 351 FINAL TIPS

    • 313 Words
    • 2 Pages

    digital forensics: acquire the evidence without changing) authenticate your recovered evidence is the same as original…

    • 313 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Forensics2E Lab02 AW

    • 256 Words
    • 2 Pages

    drive. You prepared the contents of the seized hard drive using a variety of forensic tools as…

    • 256 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Cis 417 Assignment 1

    • 755 Words
    • 4 Pages

    There are many challenges for a computer forensics specialist and everyone faces the same challenges. There first challenge is to find a way to examine an increasing number of digital devices, each containing an immense volume of data, in a timely manner with limited resources (Charles L Cohen, n.d.). Another challenge is the fact that offenders are finding easier ways to store data. They…

    • 755 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Case Project 5-3 & 5-5

    • 865 Words
    • 4 Pages

    Under the silver platter doctrine, evidence obtained by state agents in an unreasonable search and seizure was admissible in a federal criminal trial, where no federal agent participated in a search and seizure and the state officers did not act solely on behalf of the United States (Hills, 1999). Simply put, federal officers cannot allow state police to do the dirty work, and then claim that they did not violate search and seizure rights. By analogy, no government agent can stand by, allow a private citizen to violate search and seizure strictures on the government 's behalf, and then claim innocence as to the violation (Hills, 1999).…

    • 865 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Many times, computer forensics practitioners work with traditional forensics experts in criminal investigations to reveal evidence. With frequent work experiences with forensics experts and lawyers, having a general knowledge of relevant laws and ethics is a nice complement to any computer forensics practitioner’s skill set. Furthermore, as many audits are conducted on businesses and illegal organizations are done electronically, computer forensics experts may want to have working knowledge in accounting and/or finance in order to prepare for such jobs.…

    • 524 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab 1

    • 414 Words
    • 2 Pages

    1. What is the main purpose of a software tool like WinAudit in computer forensics?…

    • 414 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Skin and Dermal Papillae

    • 497 Words
    • 2 Pages

    First the collector must secure and isolate the crime scene by removing all unauthorized people off the scene and then block it off with rope or crime scene tape. Then they will record by taking photos of the evidence and numbering them you have to be very carefully to secure them in their proper bags and containers. You would also take notes of all evidence collected. Search for evidence should be thorough and systematic. When you are collecting from a person you must get the clothing, fingernail scraping, head and pubic hairs, blood, swabs for sex related crimes, bullet from the body and hand swab from shooting victims.…

    • 497 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Helix3 Pro Step Action

    • 1321 Words
    • 5 Pages

    Helix is a very powerful tool. But with great power comes great responsibility, and as a potential forensics investigator, it is your responsibility to learn how to use this tool properly. Before you examine any system, you need to make sure that you have permission to examine that system. You need to know the legal aspects of collection, documentation, and preservation of digital evidence. You need to know how to use the tools. Simple mistakes and good intentions can completely destroy digital evidence. It is strongly recommended that aspiring investigators learn about digital forensics, and practice on controlled systems before attempting to collect evidence from a real system.…

    • 1321 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Forensic Science 1.06

    • 658 Words
    • 2 Pages

    1. Why do you think it is so important to use proper methods when collecting evidence from a crime scene?…

    • 658 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    After the preservation phase, forensics are required to locate and identify any evidence that can be used to aid the crime case. There are several locations where evidence are usually found such as in the hard drive on the user’s personal computer, laptop, smart phone or tablet (ACPO, 2012). It is also critical that forensics are aware of the intention of the particular investigation. This aids in the forensics' efforts of locating digital evidences that are relevant to the case. For example, in the case of a server intrusion, forensics should look out for signs such as a rootkit installation, analyze configuration files, logs files and etc. These are possible locations and processes where traces of evidence can be picked out from (Carrier and Spafford, 2003).…

    • 257 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    forensic

    • 266 Words
    • 1 Page

    Information technology knowledge and skills are necessary tools of the forensic accountant in a world filled which paperless crimes. At minimum, forensic accountants must know the point at which they should contact an expert in computer hardware or software. Examples of ways that forensic accountants use information technology skills to quarantine data, extract data through data mining, design and implement controls over data manipulation, accumulate baseline information for comparison purpose, and analyze data.…

    • 266 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    Nothing

    • 4138 Words
    • 17 Pages

    Once a piece of physical evidence has been recovered it is of vital importance to be properly packaged, labelled and stored as soon as possible after the recovery. Furthermore, in order to avoid cross-contamination or any damage through contact all items must be packaged in separate appropriate containers. All containers must be completely sealed in order to avoid losing a valuable evidential item or for avoiding cross-contamination between the samples. There are several types of physical evidence, for that reason there are different packaging containers. A criminalist in order to be well-prepared must have a large amount of tools and different packaging containers when examining a crime-scene. Small items or trace evidence such as hair, glass and fibres can be packaged at an unbreakable plastic pill bottle with pressure lids or they can be wrapped in pre-folded paper (this is known as…

    • 4138 Words
    • 17 Pages
    Better Essays
  • Satisfactory Essays

    Many people are familiar with the T.V. show NCIS and with the character Abby. Yet, most people don’t really understand the all the aspects of forensics and think that it would be an easy job. But in reality, forensic science involves so much more. Forensics is job that varies from day to day. This paper describes the job of being a Forensic Scientist; in terms of salary, outlook, day to day activity, and education need for being a forensic scientist.…

    • 396 Words
    • 2 Pages
    Satisfactory Essays