Verified Document

Computer Forensics: Generally, Forensics Can Be Described Essay

Computer Forensics: Generally, forensics can be described as the process of using scientific knowledge in the gathering, evaluation, and presentation of evidence to the courts. Since forensics deal with the presentation of evidence to the courts, it basically deals with the analysis and recovery of hidden evidence. In this case, the hidden evidence may be in several forms including fingerprints, blood stains, and DNA evidence. On the other hand, computer forensics can be described as the discipline that merges fundamentals of law and computer science to gather and evaluate data from computer systems in forms that are admissible as evidence within the courts. These computer systems include wireless communications, computer networks, and storage devices. Computer forensics has emerged as a new discipline and field in the recent past due to the recent increase in cyber terrorism. Consequently, there is minimal standardization and uniformity across the computer forensics industry and the courts.

Importance of Computer Forensics:

The main goal of this process is to conduct structured analysis while preserving a well-documented series of evidence to determine the actual occurrences on a computer system and the responsible person or people. While this discipline has only developed in the recent past, it has become a renowned field of scientific expertise that involves various processes, necessary coursework, and certification.

Computer forensics is a vital field of scientific research because it helps in preserving important evidence that is admissible in a...

Parts of this document are hidden

View Full Document
svg-one

Through computer forensics, an organization can acquire important information regarding its network and help in the identification and prosecution of intruders of the network. Secondly, computer forensics can help in saving an organization's finances, especially with the increase in expenditures towards computer and network security. This field saves an organization's expenditures by reducing the money spent on intrusion-detection and vulnerability-assessment programs.
The Process Involved in Computer Forensics:

Computer forensics basically involves the use of various important processes since forensic investigators need to follow an established set of procedures. The first process or phase in this procedure involves the isolation of the specific computer to ensure that it cannot be tainted accidentally. The isolation of the computer helps in preserving the original media and data through the secure storage of the computer hard drive. However, a forensic image or copy of the original media is made and used for conducting analysis in contrast with the original media.

The second process is the identification procedure with which possible containers of the computer-related evidence is conducted. In most cases, this involves the use of log files, floppy disks, and hard disks since the containers are not primarily regarded as evidence itself. The identification stage includes the discovery of data and information that is relevant to the specific situation through various ways like conducting keyword searches (Hailey,…

Sources used in this document:
References:

"Computer Forensics." (2008). U.S.-CERT. Retrieved from United States Computer Emergency

Readiness Team website: http://www.us-cert.gov/reading_room/forensics.pdf

Hailey, S. (2003, September 19). What is Computer Forensics? Retrieved March 3, 2012, from http://www.csisite.net/forensics.htm

"New Jersey Regional Computer Forensic Laboratory." Partner in America's Premier Digital
Forensic Laboratory Network. Retrieved from U.S. Department of Justice -- Federal Bureau of Investigation website: http://www.njrcfl.org/downloads/documents/NJRCFLbrochure.pdf
Cite this Document:
Copy Bibliography Citation

Related Documents

Technology in Film Fred Ott Was the
Words: 1898 Length: 6 Document Type: Essay

Technology in Film Fred Ott was the very first movie star that every existed. His brief starring role in the five-second film that showed him sneezing started the use of technology to make films. Since then, technology both in and out of film has changed immeasurably and what technology is used and is said about technology in these same films has evolved quite a lot and the statements sometimes made are

Technology Proposal Social Networking and
Words: 1070 Length: 4 Document Type: Term Paper

Creating an effective library social networking platform needs to start with a view of how to create a content management system (CMS) first (Dickson, Holley, 2010). The CMS serves as the system of record of all catalog and collection items, providing valuable statistics on how each book, content and collection item is being used (Shapira, Zabar, 2011). This is extremely valuable information for each department in the library to

Technology for Students With Disabilities
Words: 3214 Length: 11 Document Type: Research Paper

These benefits arise because of implementing both assistive technologies and Information Communication technology (ICT). The implementation of technology in classrooms usually has benefits to both the disabled students as well as the teachers (Kirk, Gallagher, Coleman, & Anastasiow, 2012, p.240). The general benefits of use of assistive technologies and ICT in teaching students with learning disabilities include greater learner autonomy and unlocking hidden potential with those with communication difficulties.

Technology in the Workplace the
Words: 2715 Length: 9 Document Type: Research Paper

Instead, organizations must strike a balance between the autonomy and independence offered by technology in the workplace and the need for employees to have some level of formal and informal commitment to the organization as a whole. Just as seemingly counterproductive activities such as doodling, daydreaming, or, in the information age, surfing the internet, can actually contribute to efficiency by offering employees productive mental stimulation, so too can the

Technology in the Classroom in Today's Society,
Words: 3260 Length: 10 Document Type: Research Paper

Technology in the Classroom In today's society, technology has become an accepted medium for communication. From email correspondence that has taken the place of mail, to texting instead of talking, advances in technology have become integrated into our daily lives. However, the line should be drawn when it comes to technology impeding academics and being incorporated into the classroom. Although many support the notion of technology in the class, others see

Technology Acceptance Model Tam and Information Systems Success...
Words: 4229 Length: 15 Document Type: Literature Review

Technology Acceptance Model Using Technology Acceptance Model (TAM) to Assess User Intentions and Satisfaction on Software as a Service (SaaS): The Value of SaaS Software as a Service (SaaS) was researched by Benlian and Hess (2011) in an effort to determine its value to companies. Among the arguments was that SaaS is already declining in popularity even though it is very new. The majority of the arguments that lean in that direction have

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now