Monday, April 29, 2019

Forensic Computing Case Study Example | Topics and Well Written Essays - 2000 words

Forensic Computing - Case Study ExampleThis involves data recoveries, retrievals, analysis, and tracing and decrypting of in any the data that has been used in any deceitful activity. The word rhetorical is used in the context of use of legal argumentation. Forensic computing is also termed as digital forensics and cyber forensics. It is a branch of forensics related to calculator and other digital media. It involves collection, preservation and analysis of the data available on the computer. The definition presented by computing machine Forensic world the field primarily involves use of analytical and investigative techniques to identify, collect, examine, and preserve evidence / tuition which is magnetically stored or encoded (1). In other words, forensic computing deals with retrieval of data, and events reconstruction that was performed over the digital media. The scope of forensic investigation involves audio examinations, signal interpretation, repairing the damaged media . Photogrammetry is another aspect of digital forensic track that includes measuring and superintending the physical measures of an image by making use of geometric formulae and thusly making a comparison based on on-site observations. Several factors come as constraints on with computer forensics and the first being the costs since all the equipment used in these wait ones is high tech and relegate of the art, large investments are inducted into it. The second hurdle that could be faced by the forensic body is the boon and acceptance of all the proofs by the court. They must prove it to the court that no information is altered and all the legal responsibilities have been fulfilled while conducting the operations. The staff inducted in digital forensic must be knowledgeable and should be able to think about many possibilities and should have knowledge beyond the books. latent clues and areas that the forensic team would target DNA samples Voice samples Any image used in the process The network used for performing the task ( usually in case of credit card and beach accounts forgery) Fingerprints on the electronic equipments Answering machines recordings Miscellaneous electronic equipment Introduction The aim of forensic computing is to involve online activities secure, stop illegal activities that are going on, identify and apprehend the guilty, avoid financial and personal damages to individuals and organizations that might be incurred by the online use. Standard procedures must be followed and all the evidence brought in prior of the court must be in a formal pattern that can stand as evidence. In case of actions, warrants are obtained from the authorities for the areas and houses that are suspected of any wrongdoings. A giant footprint in the direction of forensic computing was taken in 1984 when the F.B.I Magnetic Media Program was created which was later born-again into Computer Analysis and Response Team (C.A.R.T). F.B.I report for the year 2003 reported a total of $900,000 webbed through computer crime (2). By 2003 F.B.I (C.A.R.T) were looking into 783 terabytes of data as a case of forensic evidence and cases handling. In 1997 G8 ordered training of individuals for looking into matters related to online counterfeit activities .C.A.R.T provides assistance to F.B.I in tracking e-evidence and accessing the accounts and provides other technical support needed by F.B.I in conducting forensic activities. Part of C.A.R.T job is to monitor live activities that are going online. Their task is to provide monitoring in business environment including the banks and government-owned organizations, policy companies, personal accounts that contain the peoples private life and their safety concerned, corporate level that includes the yearbook reports, facts and data and institutes of any region whose data can be misused by any dishonest activities performed online.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.