Preview

Digital Forensics Essay

Good Essays
Open Document
Open Document
1416 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Digital Forensics Essay
Title
Digital forensics is a branch of forensics science deals with the identification, acquisition and validation of digital evidence obtained from digital storage device, computers and networks. This project is mainly focusing on creating a digital forensic scenario challenge combining both network and disk forensics. It also involves analyzing the challenge with various tools and techniques. The implementation include setting up the network and services, capturing network traffic and creating disk image for further analysis. The scope of the project involves the assessment, acquisition, examine and reporting of forensics evidence obtained from the scenario. The project deliverables include the network capture file, disk image
…show more content…
The challenge is also resolved using different forensic tools.
The main objectives of the project are:
1. To study the different scenario and techniques used in digital forensics
Need to do some research on various digital forensics scenarios and the method used to resolve the digital forensic scenario challenge.
2. To create a sample scenario including both network and computer forensics
Need to be fictional cases include network and data analysis. For eg: sharing company confidential data with the competitor.
3. To resolve the case and report using appropriate tools and methods.
The case needs to be resolved using specific tools such as wire shark, network miner. Also to find out any other specific tools to resolve the issue.

The main significance of digital forensics is to identify the proof of a crime, it is able to be utilized to facts to particular suspect, affirm explanations or articulations, focus goal, distinguish sources or authenticate documents. The forensic tools can help us to identify potential digital evidence. In addition to the identification of evidence of murders, terrorism, where the tools are used commonly but it is also used in other types of crime such as child pornography or stalking. Also helps to guarantee the overall reliability and survivability of the network infrastructure. Considerate the lawful and specialized parts of
…show more content…
In right on time days, it was called computer forensics since the proof gathered was confined to computers. On the other hand, as of late, with a few innovative advances, this limitation is no more genuine. Hence, the procedure of leading forensic examinations including contemporary advanced confirmation has turned out to be all the more demanding.
Digital forensic sciences created as a unrestricted field in late 1990s and mid-2000 when computer based corruption began developing with the expanding prevalence of computers and particularly the Internet. Of the around half of respondents who experienced no less than one security occurrence a year ago, completely 45.6 percent of them reported they'd been the subject of no less than one focused on

You May Also Find These Documents Helpful

  • Powerful Essays

    272. Newman, R. (2007). Computer Forensics: Evidence Collection and Managment. Boca Raton FL: Taylor & Francis Group. LLC.…

    • 4846 Words
    • 17 Pages
    Powerful Essays
  • Powerful Essays

    In this case study I will examine the forensic evidence (limited to the main ballistic evidence), that was presented in the criminal trials and the forensic evidence that was introduced by the prosecution.…

    • 1606 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    Iscs 451 Assignment 6

    • 576 Words
    • 3 Pages

    A checklist should be created off of the operating procedures and brought to each crime scene by the investigator. Every electronic device should be photographed before touching anything. The checklist should be followed step by step and every item needs to be put into an evidence bag and tagged. Then a chain of custody document needs to be created for every piece of evidence. No analysis should be done on the original copy of any device. All analysis should be done on system image copies of each…

    • 576 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    MGS 351 FINAL TIPS

    • 313 Words
    • 2 Pages

    digital forensics: acquire the evidence without changing) authenticate your recovered evidence is the same as original…

    • 313 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Cis 417 Assignment 1

    • 755 Words
    • 4 Pages

    There are many challenges for a computer forensics specialist and everyone faces the same challenges. There first challenge is to find a way to examine an increasing number of digital devices, each containing an immense volume of data, in a timely manner with limited resources (Charles L Cohen, n.d.). Another challenge is the fact that offenders are finding easier ways to store data. They…

    • 755 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Assignment5

    • 285 Words
    • 1 Page

    The three phases of computer forensic investigations are; acquire the evidence, authenticate the evidence, and analyze the evidence. In acquiring the evidence the data is collected. Authenticating the evidence a chain of custody is used for the evidence to ensure its trustworthiness. Finally in analyzing the evidence the data is viewed and if need be a copy of the evidence can be created.…

    • 285 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Many times, computer forensics practitioners work with traditional forensics experts in criminal investigations to reveal evidence. With frequent work experiences with forensics experts and lawyers, having a general knowledge of relevant laws and ethics is a nice complement to any computer forensics practitioner’s skill set. Furthermore, as many audits are conducted on businesses and illegal organizations are done electronically, computer forensics experts may want to have working knowledge in accounting and/or finance in order to prepare for such jobs.…

    • 524 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Following the proper procedures within the means of the law and following a chain of command will help to ensure a conviction in cybercrimes. There are many different kinds of cybercrime, knowing the investigative process for the differences will assist in locating electronic evidence. The electronic evidence may include following Internet Protocol (IP) addresses, computer history logs, emails, files, and videos. While poor investigating will let the criminal avoid prosecution, conducting a proper cybercrime investigation can ensure a conviction.…

    • 664 Words
    • 3 Pages
    Good Essays
  • Good Essays

    In the criminal justice investigation process forensic science and the scientific method are used. The collecting of the evidence is a very important procedure and should be done with…

    • 1471 Words
    • 6 Pages
    Good Essays
  • Better Essays

    Explain why the adversary system of trial is the best system for achieving justice in criminal trials?…

    • 1021 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    forensic

    • 266 Words
    • 1 Page

    Information technology knowledge and skills are necessary tools of the forensic accountant in a world filled which paperless crimes. At minimum, forensic accountants must know the point at which they should contact an expert in computer hardware or software. Examples of ways that forensic accountants use information technology skills to quarantine data, extract data through data mining, design and implement controls over data manipulation, accumulate baseline information for comparison purpose, and analyze data.…

    • 266 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    Nothing

    • 4138 Words
    • 17 Pages

    The search for physical evidence at a crime scene must be done thoroughly and followed by the protocol. How the criminalist will decide to execute the crime-scene investigation depends on the size and the locale of the area, as well as on the actions of the suspect(s) and victim(s) at the scene. It must be considered that physical evidence can be anything, from a massive object to a microscopic trace, however, some evidence are clearly visible but others need to be examined in the laboratory in order to be detected. Physical evidence must be processed in a way so as to prevent any change from happening between the time that was collected on the crime scene and the time it is received by the laboratory. When collecting physical evidence from a scene, any criminalist must be aware of the fact that recovery of one type of evidence can destroy another.…

    • 4138 Words
    • 17 Pages
    Better Essays
  • Better Essays

    McMahon, R. J. (2009). Forensic & Law Enforcement NetBase. Practical Handbook for Private Investigators. Taylor and Francis Group, LLC.…

    • 2064 Words
    • 9 Pages
    Better Essays
  • Good Essays

    When you think of children, what was the first thing that comes to mind? Reckless? Young? Naïve? Gullible? Into the Wild, by Jon Krakauer, is a book written about an extraordinary but childlike man who set out on a quest, looking for an adventure of being surrounded by nature. Chris McCandless, who the book is based off of, was a man of wonder. No one was ever certain about what he thought, how he felt, or why he went on this suicide journey. Was it because of his childlike recklessness? Or was it something deeper? Chris McCandless was reckless and along with that came passion, loneliness, and despair. So, can we really judge him when he made the decision to live in the most wild parts of the Alaskan state?…

    • 802 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Forensic Accounting

    • 2181 Words
    • 9 Pages

    In the present day forensic accounting plays a huge role in many of the court cases publicized by the media. With the spotlight on the profession, this is a good opportunity to discuss the following topics:…

    • 2181 Words
    • 9 Pages
    Powerful Essays