Preview

Computer Forensics

Good Essays
Open Document
Open Document
322 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Computer Forensics
Computer forensics, also called digital forensics, network forensics, or cyberforensics, is a rapidly growing field that involves gathering and analyzing evidence from computers and networks. Because computers and the internet are the fastest growing technology used for criminal activity, the need for computer forensics specialists will increase in years to come.
A computer forensics specialist examines computer media, programs, data, and log files on computers, servers, and networks. Many areas employ computer forensics specialists, including law enforcement, criminal prosecutors, military intelligence, insurance agencies, and information security departments in the private sector. A computer forensics specialist must have knowledge of the law, technical experience with many types of hardware and software products, superior communication skills, a willingness to learn and update skills, and a knack for problem solving.
When a problem occurs, it is the responsibility of the computer forensics specialist to carefully take several steps to identify and retrieve possible evidence that may exist on a suspect’s computer. These steps include protecting the suspect’s computer, discovering all files, recovering deleted files, revealing hidden files, accessing protected or encrypted files, analyzing all the data, and providing expert consultation and/or testimony as required.
A computer forensics specialist must have knowledge of all aspects of computers, from the operating system to computer architecture and hardware design. There are three main areas of law related to computer security that affect computer forensics and those come from the fourth and fifth amendment, the U.S. federal rules of evidence and hearsay and finally the three U.S. statutory laws. Computer forensic specialists must be very careful when doing any type of investigation and be sure to follow the laws, if the laws are broken in any way they can be charged with a felony. In conclusion to sum

You May Also Find These Documents Helpful

  • Powerful Essays

    272. Newman, R. (2007). Computer Forensics: Evidence Collection and Managment. Boca Raton FL: Taylor & Francis Group. LLC.…

    • 4846 Words
    • 17 Pages
    Powerful Essays
  • Satisfactory Essays

    Iscs 451 Assignment 6

    • 576 Words
    • 3 Pages

    The factors that have limited local law enforcement’s efforts against digital crime are lack of training, lack of diagnostic equipment, lack of management level recognition and support, and a lack of specialized personnel. First off, training is a paramount need for local law enforcement. Many of the officers appointed to computer crimes at the local level do not have the requisite knowledge to deal with these types of crimes. Some of these officers are even put into these roles when they don’t even want to. Also, the lack of training to patrol officers could lead to valuable evidence being inadvertently destroyed. Most local agencies lack the equipment necessary to conduct digital forensics. Many local experts have even been reported to have purchased their own equipment to do their job (Taylor, et. al., 2011). The lack of management support and recognition of computer crime analysis has led to the lack of funding for these local cyber units. With a lack of funding comes a lack of equipment, training, and the ability for personnel to specialize in digital forensics.…

    • 576 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Forensics2E Lab02 AW

    • 256 Words
    • 2 Pages

    In this lab, you acted as a forensic specialist assisting the lead forensics investigator at the Cyber…

    • 256 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Case Project 5-3 & 5-5

    • 865 Words
    • 4 Pages

    Under the silver platter doctrine, evidence obtained by state agents in an unreasonable search and seizure was admissible in a federal criminal trial, where no federal agent participated in a search and seizure and the state officers did not act solely on behalf of the United States (Hills, 1999). Simply put, federal officers cannot allow state police to do the dirty work, and then claim that they did not violate search and seizure rights. By analogy, no government agent can stand by, allow a private citizen to violate search and seizure strictures on the government 's behalf, and then claim innocence as to the violation (Hills, 1999).…

    • 865 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Forensic scientists collect and analyze the evidence, give an expert testimony, and train other law enforcement individuals on how to record and collect evidence.…

    • 829 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Many times, computer forensics practitioners work with traditional forensics experts in criminal investigations to reveal evidence. With frequent work experiences with forensics experts and lawyers, having a general knowledge of relevant laws and ethics is a nice complement to any computer forensics practitioner’s skill set. Furthermore, as many audits are conducted on businesses and illegal organizations are done electronically, computer forensics experts may want to have working knowledge in accounting and/or finance in order to prepare for such jobs.…

    • 524 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Following the proper procedures within the means of the law and following a chain of command will help to ensure a conviction in cybercrimes. There are many different kinds of cybercrime, knowing the investigative process for the differences will assist in locating electronic evidence. The electronic evidence may include following Internet Protocol (IP) addresses, computer history logs, emails, files, and videos. While poor investigating will let the criminal avoid prosecution, conducting a proper cybercrime investigation can ensure a conviction.…

    • 664 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    2. A forensic scientist must analyze evidence from crime scenes, provide an expert testimony during court cases, and assist in training other law enforcement employees to properly gather crime scene evidence to ensure it is not contaminated.…

    • 625 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    -Brief Description- Forensic scientist’s help investigators solve crimes by analyzing the pieces of evidence that have been gathered from a crime scene. They might work with a wide variety of evidence types, or specialize in an area such as DNA evidence or fingerprint examination.…

    • 589 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    To be competitive, and in order to be successful, in the field of forensic science, you must come into the job well equipped. It would require a Bachelor’s degree in Natural Science at the very minimum to become a forensic science technician. There are many different types of natural sciences, such as chemistry, which would involve the study of paint, chemicals, and similar substances and compounds along with their relationship to each other. Another study would be biology, as it pertains to trace and DNA evidence, including blood, hair, fibers, and many natural substances. A final science study would be that of drugs and toxicology as it involves testing for the presence or absence of drugs, alcohol and poisons in blood and tissue samples (What Is A Forensic Lab Technician?) (How To Become A Forensic Science Technician). Many people who seek to be at the top of the list for becoming a forensic science technician will have an Undergraduate degree in Natural Science as well as a Master’s degree in Forensic Science (How to Become A Forensic Science Technician). In addition to having four to six years of schooling, a candidate…

    • 392 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    After the preservation phase, forensics are required to locate and identify any evidence that can be used to aid the crime case. There are several locations where evidence are usually found such as in the hard drive on the user’s personal computer, laptop, smart phone or tablet (ACPO, 2012). It is also critical that forensics are aware of the intention of the particular investigation. This aids in the forensics' efforts of locating digital evidences that are relevant to the case. For example, in the case of a server intrusion, forensics should look out for signs such as a rootkit installation, analyze configuration files, logs files and etc. These are possible locations and processes where traces of evidence can be picked out from (Carrier and Spafford, 2003).…

    • 257 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Cj100

    • 722 Words
    • 3 Pages

    | The ability to stay non-biased, an understanding of forensic science, knowledge of psychology, attention to detail, and an ability to read people and body language.…

    • 722 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Computer security is made up of digital forensic, network security, and preventing malware, and is a rapidly growing field that involves gathering and analyzing evidence from computers and networks. Because computers and the internet are the fastest growing technology used for criminal activity, the need for computer security managers will increase in years to come.…

    • 525 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Evidence is a type of proof. It is usually used to prove someone innocent or guilty. There are many different types of evidence, such as: testimony, direct, circumstantial, and physical evidence. However, according to the article “Forensic: Evidence, Clues, and Investigation” by Andrea Campbell, forensic evidence is the best evidence to present at a court case or trial.…

    • 226 Words
    • 1 Page
    Good Essays
  • Satisfactory Essays

    forensic

    • 266 Words
    • 1 Page

    Information technology knowledge and skills are necessary tools of the forensic accountant in a world filled which paperless crimes. At minimum, forensic accountants must know the point at which they should contact an expert in computer hardware or software. Examples of ways that forensic accountants use information technology skills to quarantine data, extract data through data mining, design and implement controls over data manipulation, accumulate baseline information for comparison purpose, and analyze data.…

    • 266 Words
    • 1 Page
    Satisfactory Essays