Preview

Cyber Forensics: Development of a Case Hypothesis

Good Essays
Open Document
Open Document
1026 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Cyber Forensics: Development of a Case Hypothesis
Throughout time past, forensic science disciplines have helped solved numerous crime investigations and it has given impelling testimony in the area of court trials. In order to reduce the sagacity of siding or bias situation and avoidance in prosecuting innocent victims, it is important to analyse, validate and have proper presentation of digital evidence in the context of cyber forensics examinations. [1] (Noblett et al, 2000) in this essay we will discuss on various topics that describe, explain or illustrate on issues such as the processes that assist in the development of a case hypothesis and as well as alternative hypothesis. It will also cover the processes in which how validation check and test are conducted to determine the accuracy of the digital evidence. Furthermore, we will look into the deductive, inductive and abductive reasoning in the field of cyber forensics. Lastly, the essay will also cover on the processes that would improve the communication and presentation of case analysis to the solicitors and courts. INTRODUCTION
Before the term cyber forensics was introduced in the late 1960s, most crimes are formally solved using traditional forensic science disciplines. Before the first PC computer was invented, crimes in those days were not as complicated as compared to today. In this introduction section, we will distinguish between what is forensic science and how it is different from cyber forensics.
Forensic science depends on the capability of the research scientists to develop a case report based on the outcome of a scientific review. For instance , a DNA report analysis of a murder case can be undertaken without the prior knowledge of the victim’s name or exact situation of the crime.[2] (Chakraborty, R.1990)
On the contrary, cyber forensics science’s main focus is driven on information discovered during the investigation. However the challenge lies in the search hunt of valid and admissible evidence in the media storage of a

You May Also Find These Documents Helpful

  • Powerful Essays

    272. Newman, R. (2007). Computer Forensics: Evidence Collection and Managment. Boca Raton FL: Taylor & Francis Group. LLC.…

    • 4846 Words
    • 17 Pages
    Powerful Essays
  • Powerful Essays

    In this case study I will examine the forensic evidence (limited to the main ballistic evidence), that was presented in the criminal trials and the forensic evidence that was introduced by the prosecution.…

    • 1606 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    Cis 417 Assignment 1

    • 755 Words
    • 4 Pages

    There are many challenges for a computer forensics specialist and everyone faces the same challenges. There first challenge is to find a way to examine an increasing number of digital devices, each containing an immense volume of data, in a timely manner with limited resources (Charles L Cohen, n.d.). Another challenge is the fact that offenders are finding easier ways to store data. They…

    • 755 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Assignment5

    • 285 Words
    • 1 Page

    The three phases of computer forensic investigations are; acquire the evidence, authenticate the evidence, and analyze the evidence. In acquiring the evidence the data is collected. Authenticating the evidence a chain of custody is used for the evidence to ensure its trustworthiness. Finally in analyzing the evidence the data is viewed and if need be a copy of the evidence can be created.…

    • 285 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Case Project 5-3 & 5-5

    • 865 Words
    • 4 Pages

    Under the silver platter doctrine, evidence obtained by state agents in an unreasonable search and seizure was admissible in a federal criminal trial, where no federal agent participated in a search and seizure and the state officers did not act solely on behalf of the United States (Hills, 1999). Simply put, federal officers cannot allow state police to do the dirty work, and then claim that they did not violate search and seizure rights. By analogy, no government agent can stand by, allow a private citizen to violate search and seizure strictures on the government 's behalf, and then claim innocence as to the violation (Hills, 1999).…

    • 865 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Many times, computer forensics practitioners work with traditional forensics experts in criminal investigations to reveal evidence. With frequent work experiences with forensics experts and lawyers, having a general knowledge of relevant laws and ethics is a nice complement to any computer forensics practitioner’s skill set. Furthermore, as many audits are conducted on businesses and illegal organizations are done electronically, computer forensics experts may want to have working knowledge in accounting and/or finance in order to prepare for such jobs.…

    • 524 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Following the proper procedures within the means of the law and following a chain of command will help to ensure a conviction in cybercrimes. There are many different kinds of cybercrime, knowing the investigative process for the differences will assist in locating electronic evidence. The electronic evidence may include following Internet Protocol (IP) addresses, computer history logs, emails, files, and videos. While poor investigating will let the criminal avoid prosecution, conducting a proper cybercrime investigation can ensure a conviction.…

    • 664 Words
    • 3 Pages
    Good Essays
  • Good Essays

    In the criminal justice investigation process forensic science and the scientific method are used. The collecting of the evidence is a very important procedure and should be done with…

    • 1471 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    After the preservation phase, forensics are required to locate and identify any evidence that can be used to aid the crime case. There are several locations where evidence are usually found such as in the hard drive on the user’s personal computer, laptop, smart phone or tablet (ACPO, 2012). It is also critical that forensics are aware of the intention of the particular investigation. This aids in the forensics' efforts of locating digital evidences that are relevant to the case. For example, in the case of a server intrusion, forensics should look out for signs such as a rootkit installation, analyze configuration files, logs files and etc. These are possible locations and processes where traces of evidence can be picked out from (Carrier and Spafford, 2003).…

    • 257 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Forensic science is a separate entity from the police; although a large portion of the work is obtains through law enforcement. Forensic science is a recognizable component of policing during criminal investigation. The successful resolution from a crime scene involves preventing the site from being contaminated. This helps assures a great deal of gathering and interpreting evidence that could lead to an accurate interpretation of the event. The advances in technology are being applied to forensic science; a field in which technical is achieved by many factors such as including training, experience, continued education, and scientific methodology (NYSP, 2007).…

    • 1454 Words
    • 6 Pages
    Powerful Essays
  • Better Essays

    Nothing

    • 4138 Words
    • 17 Pages

    The search for physical evidence at a crime scene must be done thoroughly and followed by the protocol. How the criminalist will decide to execute the crime-scene investigation depends on the size and the locale of the area, as well as on the actions of the suspect(s) and victim(s) at the scene. It must be considered that physical evidence can be anything, from a massive object to a microscopic trace, however, some evidence are clearly visible but others need to be examined in the laboratory in order to be detected. Physical evidence must be processed in a way so as to prevent any change from happening between the time that was collected on the crime scene and the time it is received by the laboratory. When collecting physical evidence from a scene, any criminalist must be aware of the fact that recovery of one type of evidence can destroy another.…

    • 4138 Words
    • 17 Pages
    Better Essays
  • Good Essays

    Computer forensics has become an important of litigation. Computers have become an important part of your lives. This does not exclude criminals who have the technical “know how” of hacking into computer network systems. Electronic evidence has played a role in court but obtaining can be difficult.…

    • 570 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Real Csi

    • 860 Words
    • 4 Pages

    This video raised many legitimate concerns about forensic science and the use of forensic science. Credentialing, regulations that are not in place, mistakes made by “experts”, and lawmakers using their opinions as expert testimony are all real problems with the forensic science field.…

    • 860 Words
    • 4 Pages
    Good Essays
  • Good Essays

    The handling of evidence at the scene is critical to maintaining the integrity of the evidence (Bunting, 2012, p. 90). Proper tools for acquiring the evidence at the scene are essential. These tools can be categorized as discipline-specific hardware and software, and general tools and supplies. Bunting (2012), Gogolin (2013), Kral (2011) and Nelson, Phillips and Steuart (2010) provide lists of item that a digital forensics investigator should have at the scene. The table at the end of this section summarizes the suggestions of these authors.…

    • 535 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Digital Forensic Analysis

    • 648 Words
    • 3 Pages

    Strategies in digital forensics do not have an institutionalized and predictable model. There is a need for a universal process inside forensic examinations. Although fundamental procedures for performing a comprehensive digital forensic investigation, most procedures are not universal and in this way don’t have the capacity to be exchanged through the cases. In a digital forensic investigation, interview process is very important while deciding who, what, where, when, why, and how. “A properly conducted forensic interview turns a potentially reluctant subject into an information-giving source” (Vinluan, 2015). Regardless of whether the reason for the interview is to collect information or analysis into criminal’s behavior, the interviewer’s responsible is to progress a completed comprehension of the truths. Moreover, a constructive interview process is crucial when collecting evidence and controlling the investigation in the correct direction. This paper will concentrate on the interview process in connection to incident response and investigation, and outline an interview methodology needed to carry out the digital forensic investigation in three sections. Preparing for an interview…

    • 648 Words
    • 3 Pages
    Good Essays

Related Topics