• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Introduction to Computer Forensics

Extracts from this document...

Introduction

Introduction to Computer Forensics

Coursework

CC1010N

                                         By

                       Gediminas Tamenas

11026495


Introduction to Computer Forensics

Essay will address how, electronic evidence and technique in computer forensics work. Also it will be discussing how does computer forensics works and what steps does it requires to keep all the data secure, what tools its requires to recover lost data. This will allow the reader to get clear idea what “Computer Forensics” job is about and what they do. The main purpose of forensics is to search and analyze computer system to find and evidence for suspects that can be use in court. Computer Forensics also involves preservation, identification, extraction and most important documentation of what evidence they have collected in form of magnetically, optically or electronically stored, collected data. (Robin Bryant, 2008) Most of the techniques that investigators use in crime scene has digital counterparts, but also there is some unique aspects to computer investigation. Some say that using computer evidence in court against the criminal is not really good idea, because it’s easy to change computer data, and to check how the data been used in a crime scene. (John Sammons, 2012)

Forensic technologies are designed to prepare and extract evidence from a seized computer system.

...read more.

Middle

(Marie-Helen Maras, 2012) Investigator can collect bunch of evidence, that can be useful, but if investigator doesn’t submit proper evidence that is required, evidence may be not admissible.  All these steps are very important, but if investigator does not compete first step “Making sure that computer is Secure” investigator will not be allowed to start the investigation or the evidence they found might not be admissible.(Harlan Carvey, 2012) Some criminals also found a different way to hide files from computer forensics team and make more difficult to found evidence, some criminals use computer program called “Anti-Forensics” so detectives have to be aware of that program and carefully found the way how to disable the application before doing any investigation, so will allow accessing all data. (Robert C. Newman, 2007)

Electronic evidence is any object or piece of information or file that can be relevant to the crime being investigation. Different types of evidence exist to found good information or bad, to prove or disprove a piece of information. There are many types of evidence that can be collected such as – documentary, demonstrative, physical, direct and communicational and hearsay evidence.

...read more.

Conclusion

Computer Forensics: Cybercriminals, Laws, and EvidenceBy Marie-Helen Maras 2012

Heverly, R. & Wright, M. (2004). Cyberspace law and computer forensics. In S.

Bosworth and M.E. Kabay (Eds.), Computer Security Handbook. New York: Wiley

Sue Wilkinson. (2008). Good Practice Guide for Computer-Based Electronic Evidence

Keith J. Jones. (2005) Real Digital Forensics: Computer Security and Incident Response

Angus M. Marshall (2009)Digital Forensics: Digital Evidence in Criminal Investigation

Brian Carrier (2005) File system forensic analysis

John Sammons (2012) The Basics of Digital Forensics

Bill Nelson (2007) Guide to Computer Forensics and Investigations Third Edition

Harlan Carvey (2012) Windows Forensic Analysis Toolkit, Third Edition

Dr Wei WANG International Journal of Security (IJS) (2009) Available at:  http://www.cscjournals.org/csc/download/issuearchive/IJS/volume3/IJS_V3_I2.pdf
(Accessed 2 April 2012)

Computer Forensics: Computer Forensic Analysis Analyzes Electronic Evidence On Computers

Available at:http://www.computerforensicsassociates.com/forensics_services/computer_forensic_analysis.html. (Accessed 21 March 2012)

Computer Forensics: Cybercriminals, Laws, and Evidence - Marie-Helen Maras - Google Books.

Available at:http://books.google.co.uk/books?ei=BkhqT8_fEaq50QWz8vSBCQ&id=lnxF6Pd34MUC&dq=electronic+evidence+in+computer+forensic+investigations&q=electronic+evidence#v=snippet&q=electronic%20evidence&f=false. (Accessed 27 March 2012)

Mobile Devices. 2012. Mobile Devices.

Available at:http://www.cftt.nist.gov/mobile_devices.htm. (Accessed 27 March 2012)

...read more.

This student written piece of work is one of many that can be found in our University Degree Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related University Degree Computer Science essays

  1. Computer Crime - Hacking

    Hacking can advance the development of computing system. In that way, hacking will be professional ethical. * To find stimulate and challenge Some people like to hack computer systems because they want to find stimulate challenge. Most of this kind of people is student. Student has enough time, computing skill or knowledge, and curiosity to hack computer systems.

  2. Information systems development literature review. Since the 1960s Methodologies, Frameworks, Approaches and CASE ...

    This paper has been very useful as it clearly highlights where the problems may have began with methodologies and why IS developers are still facing these problems today. Structured and O-O methods were originally developed for mathematical and technical engineering practices, within a considerably different environment then when they were implemented.

  1. Precise analysis about The legal or illegal utilization of Internet cookies

    As Freedman (2005, p.1) asserts, "Cookies are a misunderstood computer tool". Freedman (2005, p.1) argues, during visiting a site, a cookie stores data supplied by user, and the site retrieves it later. Schneider (2002, p. EC 4.05) reached a same upshot on cookies advantages.

  2. Methods and technology used in Computer Forensics

    Contained on the disks were Microsoft Word documents taunting the authorities. By analysing the metadata contained in the documents, they were able to identify data created by a man named Dennis, and a link to the church at which Rader was a Deacon1.

  1. An Introduction to the IEEE 802.11p WAVE standard

    A problem that can arise out of this is packet loss, particularly in an urban area where there is undoubtedly going to be numerous obstructions and forms of interference. To address this issue, the following solution has been proposed; Nodes will transmit beacons, allowing other nodes to construct and implement

  2. Implementation of Path Finding Techniques in Homeland Security Robots

    Chapter 3: Figure 3.1: Simulation Snapshot.....................................................................18 Figure 3.2: Two wheels and two sensors have been added to the vehicle...............19 Figure 3.3: Final modified design of the vehicle and obstacle...........................20 Figure 3.4: Shows a simple 4X4 patch.......................................................21 Figure 3.5: Given any patch it is possible to obtain its neighbouring patches.............................................................................22 Figure

  1. RFID (Radio Frequency Identification Devices)-

    Both mandates have phase-in timelines of two to three years from a limited number of shippers and distribution centres to all shippers, materials, and distribution centres or warehouses. [Migration Management, 2004. Online] Benefits of RFID technology: The RFID system allows manufacturers, retailers, and suppliers to efficiently collect, manage, distribute, and store information on inventory, business processes, and security controls.

  2. So in order to understand what the main areas where organisation should be aware ...

    "Footprinting is the process of accumulating data regarding a specific network environment, usually for the purpose of finding ways to intrude into the environment. Footprinting can reveal system vulnerabilities and improve the ease with which they can be exploited." (http://searchsecurity.techtarget.com/home/0,289692,sid14,00.html [accessed 15 November 2005])

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work