Preview

Computer Forensics

Satisfactory Essays
Open Document
Open Document
504 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Computer Forensics
There is little debate that electronic technology including computers and the Internet are one of the most important developments of recent times. Tasks that took days to complete and that demanded hundreds of man hours to effectively execute can now be easily done at the touch of a button. But the growing importance of technology is not without its drawbacks with probably the most major one being internet and computer enabled crime.

The growing capability of computers and applications as well as the ever increasing level of interconnectivity and information sharing has made it easier for persons with malicious intent to use computers to plan terrorism attacks, conduct intellectual property theft, credit card fraud and hack computer systems to gain access to confidential information. The sophisticated nature of these crimes has seen the growing need for experts in computer forensics.

Computer forensics experts are law enforcement officers, private investigators or members of corporate audit teams whose core duties revolve around the identification, collection and analysis of electronic evidence that demonstrates the occurrence of a crime or lack thereof. Sometimes referred to as cyber cops, digital detectives or cyber investigators, their goal is not only reactive where they piece together pieces
…show more content…
To have better chances of being called up for a computer forensic job interview, one must have a degree in computer science, computer engineering, electronic engineering or a related discipline. Knowledge of the criminal justice system and especially laws around cyber crime and management of digital evidence including gathering and storing the evidence are key. Due to the sensitive nature of this role, persons working as computer forensic experts must obtain security

You May Also Find These Documents Helpful

  • Powerful Essays

    272. Newman, R. (2007). Computer Forensics: Evidence Collection and Managment. Boca Raton FL: Taylor & Francis Group. LLC.…

    • 4846 Words
    • 17 Pages
    Powerful Essays
  • Satisfactory Essays

    Iscs 451 Assignment 6

    • 576 Words
    • 3 Pages

    The factors that have limited local law enforcement’s efforts against digital crime are lack of training, lack of diagnostic equipment, lack of management level recognition and support, and a lack of specialized personnel. First off, training is a paramount need for local law enforcement. Many of the officers appointed to computer crimes at the local level do not have the requisite knowledge to deal with these types of crimes. Some of these officers are even put into these roles when they don’t even want to. Also, the lack of training to patrol officers could lead to valuable evidence being inadvertently destroyed. Most local agencies lack the equipment necessary to conduct digital forensics. Many local experts have even been reported to have purchased their own equipment to do their job (Taylor, et. al., 2011). The lack of management support and recognition of computer crime analysis has led to the lack of funding for these local cyber units. With a lack of funding comes a lack of equipment, training, and the ability for personnel to specialize in digital forensics.…

    • 576 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Forensics2E Lab02 AW

    • 256 Words
    • 2 Pages

    In this lab, you acted as a forensic specialist assisting the lead forensics investigator at the Cyber…

    • 256 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Cis 417 Assignment 1

    • 755 Words
    • 4 Pages

    There are many challenges for a computer forensics specialist and everyone faces the same challenges. There first challenge is to find a way to examine an increasing number of digital devices, each containing an immense volume of data, in a timely manner with limited resources (Charles L Cohen, n.d.). Another challenge is the fact that offenders are finding easier ways to store data. They…

    • 755 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Many times, computer forensics practitioners work with traditional forensics experts in criminal investigations to reveal evidence. With frequent work experiences with forensics experts and lawyers, having a general knowledge of relevant laws and ethics is a nice complement to any computer forensics practitioner’s skill set. Furthermore, as many audits are conducted on businesses and illegal organizations are done electronically, computer forensics experts may want to have working knowledge in accounting and/or finance in order to prepare for such jobs.…

    • 524 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    I will say that some of the most important items in a computer for a forensic investigation are: Drivers, running programs, installed programs, operating system, computer name, security setting and configurations, and firewall configurations.…

    • 664 Words
    • 3 Pages
    Better Essays
  • Good Essays

    Following the proper procedures within the means of the law and following a chain of command will help to ensure a conviction in cybercrimes. There are many different kinds of cybercrime, knowing the investigative process for the differences will assist in locating electronic evidence. The electronic evidence may include following Internet Protocol (IP) addresses, computer history logs, emails, files, and videos. While poor investigating will let the criminal avoid prosecution, conducting a proper cybercrime investigation can ensure a conviction.…

    • 664 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    -Requirements-A minimum of a bachelor's degree in natural science or forensic science is required for working in this field. Some labs might require a master's degree in forensic science for more advanced positions, such as lab technician leader or supervisor. A master's degree might also be useful for specialized areas such as DNA analysis or ballistics. Undergraduate programs include biochemistry, toxicology and criminal justice courses. Students are required to participate in extensive lab work and fulfill an internship.…

    • 589 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    After the preservation phase, forensics are required to locate and identify any evidence that can be used to aid the crime case. There are several locations where evidence are usually found such as in the hard drive on the user’s personal computer, laptop, smart phone or tablet (ACPO, 2012). It is also critical that forensics are aware of the intention of the particular investigation. This aids in the forensics' efforts of locating digital evidences that are relevant to the case. For example, in the case of a server intrusion, forensics should look out for signs such as a rootkit installation, analyze configuration files, logs files and etc. These are possible locations and processes where traces of evidence can be picked out from (Carrier and Spafford, 2003).…

    • 257 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Computer security is made up of digital forensic, network security, and preventing malware, and is a rapidly growing field that involves gathering and analyzing evidence from computers and networks. Because computers and the internet are the fastest growing technology used for criminal activity, the need for computer security managers will increase in years to come.…

    • 525 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    forensic

    • 266 Words
    • 1 Page

    Information technology knowledge and skills are necessary tools of the forensic accountant in a world filled which paperless crimes. At minimum, forensic accountants must know the point at which they should contact an expert in computer hardware or software. Examples of ways that forensic accountants use information technology skills to quarantine data, extract data through data mining, design and implement controls over data manipulation, accumulate baseline information for comparison purpose, and analyze data.…

    • 266 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    Computer crime is an ongoing issue that we continuously see, and a major problem with this is that most people do not realize the harm that computer crime can cause. Computer crime is also a niche that continues to grow. This is based on the fact that there are many different perceptions about what computer crime is, and the harmful effects it can have. Because there is a gap between traditional views of what cyber crime is and the actual realities of these crimes, it is a criminal offense that will continue to happen.…

    • 1102 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Digital Forensics Paper

    • 1176 Words
    • 5 Pages

    The stages of this process include creating a full-fledged and distinctive occupation, establishing a national association that is given various responsibilities in regards to the profession, train the future practitioners through university sponsor programs that are established and solidified, and engage in political mobilization to gain political and legal support to give members a specific niche. It is evident that digital forensics is well on its way to being established as a profession due to the fact that many digital forensic programs are being offered and training individuals at universities and many of the law enforcement agencies in the United States staff practitioners. However, digital forensics still possesses many issues to becoming a full fledge profession, due to the fact that they do not have an established national association that represents its interests, educates the public, enforces a code of ethics, etc.; does not have a uniform training program in place; and possesses little to no political mobilization. I believe that if this field continues to advance as it has over the past forty years, it will indeed become a “true” profession in the near…

    • 1176 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    Mac Forensics

    • 6453 Words
    • 26 Pages

    create a forensic duplicate of a Mac hard drive and an on-site preview of a…

    • 6453 Words
    • 26 Pages
    Powerful Essays
  • Satisfactory Essays

    To become a computer forensics examiner, a bachelor degree is one if the options to go for. This degree is for the people who have an interest in the field and really want to work as a computer forensics examiner. Another option is an associate's degree. This degree allows you to find jobs in the field. In computer forensics, there are multiple branches that are all part of the main occupation. For example; if you are a private investigator, you do not need any degree. For computer technicians, a bachelor degree is needed in either criminal justice, computer science or even accounting. A 4-year degree, like a bachelor of Arts in Information Technology or Science in Computer Science, is required to begin a career as a computer forensics…

    • 146 Words
    • 1 Page
    Satisfactory Essays