Preview

Cyber

Powerful Essays
Open Document
Open Document
1224 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Cyber
ICT349 & ICT649
Sem 01 2012
Assignment 2
Research Essay

Research opportunity

1. This assignment gives you the chance to research current issues in cyber forensics affecting the ICT industry, forensic examiners, and the legal fraternity. Using sound research strategies to locate quality academic, scientific and legal research material the assignment is intended to provide you with the opportunity to:

a) Refine research and analysis skills through locating, selecting and compiling a higher-level research essay. b) Familiarise yourself with new development in cyber forensics that will affect the working and private environments of all technology users. c) Add to the general knowledge of the School of IT’s research and preparation of future unit offerings and potential research topics for student projects and post-graduate research.

2. You are, in effect, my team of researchers undertaking some relevant research of benefit to your own learning experience and future employment and research.

3. Your essay should focus on the following topics that are considered of growing significance: analysis, validation and presentation of digital evidence in cyber forensics examinations. Your research must be based on published research papers, government and other organisation standards, guidelines and papers. It should describe, explain and discuss the following issues:

- Deductive, inductive and abductive reasoning in the context of cyber forensics analysis. - Processes that assist in developing a case hypothesis and alternative hypothesis. - Validation processes that check and test the correctness of the digital evidence exhibits and their relationships with corroborating evidence relied on in legal cases. - Processes that would enhance the communication of and presentation of case analysis to the legal practitioner and courts.

5. You will be given instruction in the workshops on the format of a research essay and video

You May Also Find These Documents Helpful

  • Powerful Essays

    272. Newman, R. (2007). Computer Forensics: Evidence Collection and Managment. Boca Raton FL: Taylor & Francis Group. LLC.…

    • 4846 Words
    • 17 Pages
    Powerful Essays
  • Satisfactory Essays

    Iscs 451 Assignment 6

    • 576 Words
    • 3 Pages

    The factors that have limited local law enforcement’s efforts against digital crime are lack of training, lack of diagnostic equipment, lack of management level recognition and support, and a lack of specialized personnel. First off, training is a paramount need for local law enforcement. Many of the officers appointed to computer crimes at the local level do not have the requisite knowledge to deal with these types of crimes. Some of these officers are even put into these roles when they don’t even want to. Also, the lack of training to patrol officers could lead to valuable evidence being inadvertently destroyed. Most local agencies lack the equipment necessary to conduct digital forensics. Many local experts have even been reported to have purchased their own equipment to do their job (Taylor, et. al., 2011). The lack of management support and recognition of computer crime analysis has led to the lack of funding for these local cyber units. With a lack of funding comes a lack of equipment, training, and the ability for personnel to specialize in digital forensics.…

    • 576 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Many times, computer forensics practitioners work with traditional forensics experts in criminal investigations to reveal evidence. With frequent work experiences with forensics experts and lawyers, having a general knowledge of relevant laws and ethics is a nice complement to any computer forensics practitioner’s skill set. Furthermore, as many audits are conducted on businesses and illegal organizations are done electronically, computer forensics experts may want to have working knowledge in accounting and/or finance in order to prepare for such jobs.…

    • 524 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    A. The video I watched in the video resources was the lack of of current research viable. The success coaches mentioned that students seem to struggle on…

    • 875 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab 1

    • 414 Words
    • 2 Pages

    2. Which items within WinAudit’s initial report would you consider to be of critical importance in a computer forensic investigation?…

    • 414 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Following the proper procedures within the means of the law and following a chain of command will help to ensure a conviction in cybercrimes. There are many different kinds of cybercrime, knowing the investigative process for the differences will assist in locating electronic evidence. The electronic evidence may include following Internet Protocol (IP) addresses, computer history logs, emails, files, and videos. While poor investigating will let the criminal avoid prosecution, conducting a proper cybercrime investigation can ensure a conviction.…

    • 664 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    As you respond to these questions, reference the research and data you collected from your assignments and explain what you learned from the research in relation to the topics discussed in the course.…

    • 524 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    CAFS IRP Project Plan

    • 910 Words
    • 3 Pages

    1. In your own words briefly explain what you understand is required for the Independent Research Task?…

    • 910 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    Essay#3 Waters Denise

    • 1009 Words
    • 5 Pages

    2. What did you learn from completing this assignment? Did you experience a new understanding of the topic? Did you change your perspective after completing the research?…

    • 1009 Words
    • 5 Pages
    Better Essays
  • Better Essays

    We attempt Earth-place discipline in initiative investigations, e-exploration, information processing system protection incident answer, and digital forensics, and have cars over 50,000 digital investigators cosmopolitan. Some of our most epidemic courses end: EnCase ® v7 Transition Designed for EnCase Forensic users who are upgrading from a previous version to Version 7, the EnCase v7 Transition course details the unaccustomed features of Version 7, spotlight specifically the areas of the fruit that differ significantly from anterior versions. To chronicle for this passage, a use must have accomplished Computer Forensics II or hold an EnCE ®certification. EnCase Computer Forensics I Practical exercises and real-life simulations stipulate participants with an understanding of proper handling of digital eveidence from hold to acquirement, to the analysis and archiving of the data. EnCase Computer Forensics II Designed for investigators with muscular electronic computer discrimination, prior rhetorical training, and experience second-hand EnCase Forensic. EnCase Startup Training Encase® Start Up on-imposition result training to let you spring-in and rapidly get empty with your new software. EnCase® Start Up is convenient for cull Guidance Software products at no cost. You can refer to it whenever you indigence it; brush-up on shape and secant, or import a new abound…

    • 1310 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    After the preservation phase, forensics are required to locate and identify any evidence that can be used to aid the crime case. There are several locations where evidence are usually found such as in the hard drive on the user’s personal computer, laptop, smart phone or tablet (ACPO, 2012). It is also critical that forensics are aware of the intention of the particular investigation. This aids in the forensics' efforts of locating digital evidences that are relevant to the case. For example, in the case of a server intrusion, forensics should look out for signs such as a rootkit installation, analyze configuration files, logs files and etc. These are possible locations and processes where traces of evidence can be picked out from (Carrier and Spafford, 2003).…

    • 257 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Identity theft has ruined the lives of many. It is crucial and necessary to educate more professionals in the computer forensic field to combat this and many other cybercrimes. The following paper will help inform about identity theft and to explain how it can be resolved through digital forensics. What is identity theft? The U.S. Department of Justice defines it as when “someone wrongfully obtains and uses another person 's personal data in some way that involves fraud or deception, typically for economic gain.” There are many ways to do this. One way is when dumpster divers spend time looking through trash in…

    • 1160 Words
    • 5 Pages
    Powerful Essays
  • Better Essays

    Scientific Working Groups

    • 984 Words
    • 4 Pages

    Scientific Working Group on Digital Evidence (SWGDE) “brings together organizations actively engaged in the field of digital and multimedia evidence to foster communication and cooperation as well as to ensure quality and consistency within the forensic community.” The SWGDE works to bring together associations that are actively focused on the field of digital and multimedia evidence to bring communication and collaboration as well as…

    • 984 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Crime Thoeries

    • 704 Words
    • 3 Pages

    Robert W. Taylor, Eric J. Frisch, John Liederbach, and Thomas J. Holt (2011). Digital Crime and…

    • 704 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Forensic Computing

    • 795 Words
    • 4 Pages

    Documents produced electronically have an overwhelming percentage of the human community today compared to printed documents. Digital storage of documents is also mainly other conventional methods of storage and shall be transmitted largely through electronic networks and the Internet. Billions of emails are sent annually in the human communication, surpassing the traditional mail communication. All these ways of drafting documents, their storage and communication have opened new doors for abuse and criminality. The electronic environment raises new problems in penal systems worldwide. To go to court reprehensible acts, crimes and abuses committed by using digital environment is necessary to administer the court undeniable evidence of these facts. An important role in preventing and combating digital crime is gathering electronic evidence. Digital evidence has been defined as any data that can establish that a crime has been committed or can provide a link between a crime and its victim (Casey, 2000). Digital evidences, like normal (traditional) evidences, must pass the test of admissibility and weight. Admissibility is a set of legal rules applied by judges in order to allow the use of evidence in a court of law. Weight is the validity and importance of the evidence. Therefore evidence must be: admissible, authentic, complete, reliable and believable (Casey, 2011). Following these rules is essential to guaranteeing successful evidence collection. Digital forensic investigators are commonly employed to deal with such cases and they make use of principles and procedures currently employed for gathering evidence from computer, network, internet and mobile devices that are found in ACPO Good Practice Guide for digital evidence updated in March 2012. Therefore there are four principles that the first responder to the crime must follow. Principle 1: “No action taken by law enforcement agencies, persons employed within those agencies or their agents should change data…

    • 795 Words
    • 4 Pages
    Good Essays