- Level: University Degree
- Subject: Mathematical and Computer Sciences
- Word count: 1560
Introduction to Computer Forensics
Extracts from this document...
Introduction
Introduction to Computer Forensics
Coursework
CC1010N
By
Gediminas Tamenas
11026495
Introduction to Computer Forensics
Essay will address how, electronic evidence and technique in computer forensics work. Also it will be discussing how does computer forensics works and what steps does it requires to keep all the data secure, what tools its requires to recover lost data. This will allow the reader to get clear idea what “Computer Forensics” job is about and what they do. The main purpose of forensics is to search and analyze computer system to find and evidence for suspects that can be use in court. Computer Forensics also involves preservation, identification, extraction and most important documentation of what evidence they have collected in form of magnetically, optically or electronically stored, collected data. (Robin Bryant, 2008) Most of the techniques that investigators use in crime scene has digital counterparts, but also there is some unique aspects to computer investigation. Some say that using computer evidence in court against the criminal is not really good idea, because it’s easy to change computer data, and to check how the data been used in a crime scene. (John Sammons, 2012)
Forensic technologies are designed to prepare and extract evidence from a seized computer system.
Middle
Electronic evidence is any object or piece of information or file that can be relevant to the crime being investigation. Different types of evidence exist to found good information or bad, to prove or disprove a piece of information. There are many types of evidence that can be collected such as – documentary, demonstrative, physical, direct and communicational and hearsay evidence.
Conclusion
Computer Forensics: Cybercriminals, Laws, and EvidenceBy Marie-Helen Maras 2012
Heverly, R. & Wright, M. (2004). Cyberspace law and computer forensics. In S.
Bosworth and M.E. Kabay (Eds.), Computer Security Handbook. New York: Wiley
Sue Wilkinson. (2008). Good Practice Guide for Computer-Based Electronic Evidence
Keith J. Jones. (2005) Real Digital Forensics: Computer Security and Incident Response
Angus M. Marshall (2009)Digital Forensics: Digital Evidence in Criminal Investigation
Brian Carrier (2005) File system forensic analysis
John Sammons (2012) The Basics of Digital Forensics
Bill Nelson (2007) Guide to Computer Forensics and Investigations Third Edition
Harlan Carvey (2012) Windows Forensic Analysis Toolkit, Third Edition
Dr Wei WANG International Journal of Security (IJS) (2009) Available at: http://www.cscjournals.org/csc/download/issuearchive/IJS/volume3/IJS_V3_I2.pdf
(Accessed 2 April 2012)
Computer Forensics: Computer Forensic Analysis Analyzes Electronic Evidence On Computers
Available at:http://www.computerforensicsassociates.com/forensics_services/computer_forensic_analysis.html. (Accessed 21 March 2012)
Computer Forensics: Cybercriminals, Laws, and Evidence - Marie-Helen Maras - Google Books.
Available at:http://books.google.co.uk/books?ei=BkhqT8_fEaq50QWz8vSBCQ&id=lnxF6Pd34MUC&dq=electronic+evidence+in+computer+forensic+investigations&q=electronic+evidence#v=snippet&q=electronic%20evidence&f=false. (Accessed 27 March 2012)
Mobile Devices. 2012. Mobile Devices.
Available at:http://www.cftt.nist.gov/mobile_devices.htm. (Accessed 27 March 2012)
This student written piece of work is one of many that can be found in our University Degree Computer Science section.
Found what you're looking for?
- Start learning 29% faster today
- 150,000+ documents available
- Just £6.99 a month