Verified Document

Computer Forensics: Generally, Forensics Can Be Described Essay

Computer Forensics: Generally, forensics can be described as the process of using scientific knowledge in the gathering, evaluation, and presentation of evidence to the courts. Since forensics deal with the presentation of evidence to the courts, it basically deals with the analysis and recovery of hidden evidence. In this case, the hidden evidence may be in several forms including fingerprints, blood stains, and DNA evidence. On the other hand, computer forensics can be described as the discipline that merges fundamentals of law and computer science to gather and evaluate data from computer systems in forms that are admissible as evidence within the courts. These computer systems include wireless communications, computer networks, and storage devices. Computer forensics has emerged as a new discipline and field in the recent past due to the recent increase in cyber terrorism. Consequently, there is minimal standardization and uniformity across the computer forensics industry and the courts.

Importance of Computer Forensics:

The main goal of this process is to conduct structured analysis while preserving a well-documented series of evidence to determine the actual occurrences on a computer system and the responsible person or people. While this discipline has only developed in the recent past, it has become a renowned field of scientific expertise that involves various processes, necessary coursework, and certification.

Computer forensics is a vital field of scientific research because it helps in preserving important evidence that is admissible in a...

Through computer forensics, an organization can acquire important information regarding its network and help in the identification and prosecution of intruders of the network. Secondly, computer forensics can help in saving an organization's finances, especially with the increase in expenditures towards computer and network security. This field saves an organization's expenditures by reducing the money spent on intrusion-detection and vulnerability-assessment programs.
The Process Involved in Computer Forensics:

Computer forensics basically involves the use of various important processes since forensic investigators need to follow an established set of procedures. The first process or phase in this procedure involves the isolation of the specific computer to ensure that it cannot be tainted accidentally. The isolation of the computer helps in preserving the original media and data through the secure storage of the computer hard drive. However, a forensic image or copy of the original media is made and used for conducting analysis in contrast with the original media.

The second process is the identification procedure with which possible containers of the computer-related evidence is conducted. In most cases, this involves the use of log files, floppy disks, and hard disks since the containers are not primarily regarded as evidence itself. The identification stage includes the discovery of data and information that is relevant to the specific situation through various ways like conducting keyword searches (Hailey,…

Sources used in this document:
References:

"Computer Forensics." (2008). U.S.-CERT. Retrieved from United States Computer Emergency

Readiness Team website: http://www.us-cert.gov/reading_room/forensics.pdf

Hailey, S. (2003, September 19). What is Computer Forensics? Retrieved March 3, 2012, from http://www.csisite.net/forensics.htm

"New Jersey Regional Computer Forensic Laboratory." Partner in America's Premier Digital
Forensic Laboratory Network. Retrieved from U.S. Department of Justice -- Federal Bureau of Investigation website: http://www.njrcfl.org/downloads/documents/NJRCFLbrochure.pdf
Cite this Document:
Copy Bibliography Citation

Related Documents

Computer Forensics for Preventing Email
Words: 4655 Length: 17 Document Type: Capstone Project

i.e. modifying the domain name system. 7. DNS-Based Phishing ("Pharming"): This offense is based on interference in the domain name searching process by modifying the domain name resolution sending the user to a different IP address. 8. Content-Injection Phishing: The phisher introduces fraudulent content into a legitimate website. 9. Data Theft: Malicious code that collects sensitive information stored within the machines in which it is installed. 10. Man-in-the-Middle Phishing: The phisher takes a

Digital Forensics
Words: 1974 Length: 6 Document Type: Research Paper

Digital forensic can be described as a branch of forensic science surrounding the recovery as well as investigation of materials which are found within digital devices, in many occasion regarding computer crime. Originally the term was always used as a synonym for computer forensics; however it has spread out to be used in investigations of the entire devices with capability of storing digital data. Having its grounds in the personal

Cyber Crime Forensics
Words: 2623 Length: 9 Document Type: Term Paper

Cybercrime has become a serious problem in the world we live in. The abundance of personal computers that are readily available at relatively low prices has spawned the growth in Cybercrime all over the globe. As a result, law enforcement agencies have developed cybercrime forensics which is designed to track down those that are responsible for cyber crimes. The purpose of this discussion is to analyze this subject and discuss

Response Team for Computer Security
Words: 520 Length: 2 Document Type: Term Paper

Forensics and Computer Security Incident Response Team (csirt) Plan Strategy The objective of this study is to develop and forensics and security incident response team (CSIRT) plan strategy for an organization. It is reported that a "computer security incident response team (CSIRT) is a concrete organizational entity (i.e., one or more staff) that is assigned the responsibility for coordinating and supporting the response to a computer security event or incident. CSIRTs

Odontology in Criminal Justice Forensics
Words: 7122 Length: 25 Document Type: Term Paper

In 2002 the crime lab in the state of Mississippi found that the semen in the victim's body belonged to two different men and neither of them was Kennedy Brewer. Balko concludes by stating: "Forensic scandals have been troublingly common of late, with phony experts, fake results, and incompetent testing recently uncovered in Virginia, Maryland, Kansas, Illinois, and Texas, to name just a few. Courts need to take a

Criminal Justice/Forensics Undercover Is a
Words: 11198 Length: 35 Document Type: Thesis

However, as criminals become more aware of undercover tactics, the covert officer is required to provide more and more proof that he is indeed a criminal- which leads to the officer committing acts that compromise his or her integrity for the sake of maintaining cover. By understanding the often conflicting nature of these goals, deception and integrity, we can see how an undercover officer can become confused, lost, and

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now