Thursday, June 13, 2019
Forensic Computing Case Study Example | Topics and Well Written Essays - 2000 words
Forensic Computing - Case Study ExampleThis involves data recoveries, retrievals, analysis, and tracing and decrypting of all the data that has been employ in every deceitful activity. The word forensic is used in the context of legal argumentation. Forensic computing is also termed as digital forensics and cyber forensics. It is a branch of forensics related to computer and other digital media. It involves collection, preservation and analysis of the data available on the computer. The definition presented by Computer Forensic macrocosm the field primarily involves use of analytical and investigative techniques to identify, collect, examine, and preserve evidence /information which is magnetically stored or encoded (1). In other words, forensic computing deals with retrieval of data, and events reconstruction that was performed over the digital media. The scope of forensic investigation involves audio examinations, signal interpretation, repairing the damaged media. Photogrammetr y is another aspect of digital forensic tracking that includes measuring rod and monitoring the physical measures of an realize by making use of geometric formulae and then making a comparison based on on-site observations. several(prenominal) factors come as constraints along with computer forensics and the first being the costs since all the equipment used in these processes is high tech and state of the art, large investments are inducted into it. The second hurdle that could be faced by the forensic body is the approval and acceptance of all the proofs by the court. They mustiness prove it to the court that no information is altered and all the legal responsibilities have been fulfilled while conducting the operations. The staff inducted in digital forensic must be knowledgeable and should be able to think about m whatsoever possibilities and should have knowledge beyond the books. Potential clues and areas that the forensic team would target DNA samples Voice samples Any im age used in the process The network used for performing the task ( usually in case of credit card and bank accounts forgery) Fingerprints on the electronic equipments Answering machines recordings Miscellaneous electronic equipment Introduction The aim of forensic computing is to make online activities secure, stop illegal activities that are going on, identify and apprehend the guilty, fend off financial and personal damages to individuals and organizations that might be incurred by the online use. Standard procedures must be followed and all the evidence brought in front of the court must be in a formal pattern that can stand as evidence. In case of actions, warrants are obtained from the authorities for the areas and houses that are suspected of any wrongdoings. A giant step in the direction of forensic computing was taken in 1984 when the F.B.I Magnetic Media Program was created which was later converted into Computer summary and Response Team (C.A.R.T). F.B.I report for the y ear 2003 reported a total of $900,000 netted through computer crime (2). By 2003 F.B.I (C.A.R.T) were looking into 783 terabytes of data as a case of forensic evidence and cases handling. In 1997 G8 ordered training of individuals for looking into matters related to online counterfeit activities .C.A.R.T provides assistance to F.B.I in tracking e-evidence and accessing the accounts and provides other skilful support needed by F.B.I in conducting forensic activities. Part of C.A.R.T job is to monitor live activities that are going online. Their task is to provide monitoring in business environment including the banks and government-owned organizations, insurance companies, personal accounts that contain the peoples private life and their safety concerned, corporate level that includes the annual reports, facts and data and institutes of any region whose data can be misused by any fraudulent activities performed online.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.