StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Computer Forensics in Biology - Research Paper Example

Cite this document
Summary
The paper “Computer Forensics in Biology” seeks to evaluate computer forensics or cyber forensic, which is a very crucial topic in information systems and network management. Forensics is a controlled procedure of gathering, examining and presenting facts and evidence to the court of law…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.5% of users find it useful
Computer Forensics in Biology
Read Text Preview

Extract of sample "Computer Forensics in Biology"

 Computer Forensics in the Organization Introduction Computer forensics or cyber forensics is a very crucial topic in information systems and network management. Forensics is a controlled procedure of gathering, examining and presenting facts and evidence to the court of law, and thus, forensic computing is defined as “the discipline that combines elements of law and computer science to collect and analyze data from computer systems, networks, wireless communications, and storage devices in a way that is admissible as evidence in a court of law” (US-CERT, para.4). This involves seeking, locating and securing the electronic data so as to collect evidence. This electronic or magnetically encoded data may include text messages, databases, pictures, e-mail, websites, spyware, malware, and so on. The evidence collected through forensic computing is strong and undeniable as compared to any other branch of forensic science, because a copy that is made of the collected data is identical to the actual data, and there is no scope left for objection. Application A structured investigation is carried out to sort out what exactly happened to the computer, when it happened, how it happened, and who did it. This is exactly like solving a murder case and performing postmortem. The operator does not know that the evident information is transparently being created and stored by the computer’s operating system, which can only be extracted through computer forensics software tools and techniques. The crimes include misuse of computer systems, attack on computer systems, using a computer system to work against another system, failure of a computer system, and the like. Though, internet identity theft has made people uncertain about shopping and selling online, checking their bank statements online, visiting auction websites, or entering into business contracts or transactions; however, computer forensics has played its part in helping law enforcement agencies in gathering digital evidence and identifying stolen identities as well as the criminals involved. Computer forensics security solutions focus not only on recovery but also on prevention of security threats in order to provide securer solutions that are quicker and cheaper than the conventional techniques. These solutions include intrusion detection system (IDS), internet security system, biometric security system, net privacy system, firewall set-ups, network disaster security system, identity theft prevention system, identity management security system, and so on (Vacca 146). Basic Scientific Principles Involved It is important for computer forensic investigators to follow a structured approach to solve computer and internet based identity theft cases. Computer crime involving ID theft can be grouped as physical security breaches, personnel security breaches, communications and data security breaches, and operations security breaches. A detailed investigation of the case requires that every security breach is analyzed independently to get a more systematic approach towards case solving. The digital examination of ID theft cases requires great expertise at the investigator’s end. The evidence or data that is collected is the valuable asset and has to be dealt with sensitivity, as it will help in deciding the specifications of the crime. Digital data is so delicate that it can be altered with one mistaken tap on the keyboard or one inadvertent press of a key. The forensic investigator will have to use some offline techniques in addition to online techniques. Although offline techniques are not the responsibility of a forensic investigator, but of course, he can use them to help himself toward finding the evidential data. He will have to look for any counterfeit documents, fake checks and bogus bank statements in black and white, in addition to looking for digital evidence residing inside the fraudster’s computer system. According to Angelopoulou, what makes the process lengthy is that the investigator has to go through two investigative categories, that is, going through the victim’s system and through the criminal’s system. The digital data found in the victim’s computer will help in obtaining evidence, and that found in the fraudster’s computer will prove it. The main theme of the investigation is identifying what information might have been stolen (for example, in a financial fraud ID theft, basic things to be investigated are stolen identity, credit record, transactions, billing, and claims for new bank accounts or loans) and what procedure might have been used to steal this information. It is important for the investigator to have a warrant issued first. Pladna states that “just like the need for a warrant to search someone and their property, everyone involved in the computer forensics process needs authorization from the proper authorities to monitor and collect information related to a computer intrusion” (4). Moreover, clauses of respective laws and legislations must be followed in order to legalize the whole process. Pladna (4) has listed three laws that forensic investigation should follow, namely, “Wiretap Act (18 U.S.C. 2510-22); Pen Registers and Trap and Trace Devices Statute (18 U.S.C. 3121-27); and the Stored Wired and Electronic Communication Act (18 U.S.C 2701-120)”. Both the victim’s and the fraudster’s computers must be kept in the same state in which they were before investigation. Social, Legal, and Ethical Considerations It is important to educate the users of computer systems and the internet about “intellectual property rights issues, privacy/ surveillance issues, access to data issues and issues of human-computer interaction” (Stahl, Carroll-Mayer and Norris 298). Users should know that the other person’s identity is something that is his property and not theirs; that they have no right upon others’ personal information; and that they cannot use or disclose it without the owner’s permission. A virtual world businessman should respect his employees’ and clients’ personal identification data, and should take measures to lock and protect the databases and data warehouses from unauthorized access. Computer forensic professionals should be familiar with laws and legislation that have been passed in order to make sure that internet frauds like identity theft do not take place. They should be aware of privacy rights and ethical and moral clauses found in these laws so that they may be able to better solve the case. They must know what legal issues are involved in handling a standalone computer system. The investigator must have a search warrant issued before handling the suspect’s computer system. The Fourth Amendment to the U.S. Constitution defines that the magistrate is liable to issue the search warrant after the investigator submits and affidavit that should state the cause of investigation and the limits of the suspect’s privacy that is going to be violated. The time that the computer is to be analyzed is also pre-decided by the magistrate or the warrant. For example, it may be in the warrant that the investigator can analyze the computer system for fifteen days after the issuance of the warrant. Conclusion Since, the number of internet-savvy persons or e-consumers is increasing day by day, internet crime is also increasing at the same rate, and identity theft is one such crime. It intimidates our computers and personal safety. Computer forensics has helped a great deal in dealing with and recovering from such cases. The procedure might be lengthy but time can be saved by following a well-structured approach as described in this report. There are laws regarding e-consumers’ data protection that need to be followed. The forensic investigators have to be very specific in following rules and regulations in order to make their evidence admissible to the court. They have to follow the socio-ethical norms and respect the citizens’ liberty. The users must be aware of the risk they face while disclosing their information over the internet so that they play their role in combating the crime. Works Cited Angelopoulou, Olga. “The “Solitary” of ID Theft towards Computer Crime Incidents.” ID Theft: A Computer Forensics’ Investigation Framework. University of Glamorgan, 2007. Web. 26 Apr 2012. . Pladna, Brett. “Procedures for Gathering Evidence.” Computer Forensics Procedures, Tools, and Digital Evidence Bags: What They Are and Who Should Use Them. East Carolina University, 2008. Web. 26 Apr 2012. . Stahl, Bernd Carsten, Carroll-Mayer, Moira, and Peter Norris. “Legal, Professional, and Ethical Content.” Forensic Computing: The Problem of Developing a Multidisciplinary University Course. De Montfort University, 2006. Web. 26 Apr 2012. . US-CERT. What is computer forensics? Computer Forensics. US-CERT, 2008. Web. 26 Apr 2012. . Vacca, John R. “Identity Theft.” Computer Forensics: Computer Crime Scene Investigation. USA: Cengage Learning, 2005. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Computer Forensics in Biology Research Paper Example | Topics and Well Written Essays - 1250 words”, n.d.)
Computer Forensics in Biology Research Paper Example | Topics and Well Written Essays - 1250 words. Retrieved from https://studentshare.org/biology/1449741-computer-forensics
(Computer Forensics in Biology Research Paper Example | Topics and Well Written Essays - 1250 Words)
Computer Forensics in Biology Research Paper Example | Topics and Well Written Essays - 1250 Words. https://studentshare.org/biology/1449741-computer-forensics.
“Computer Forensics in Biology Research Paper Example | Topics and Well Written Essays - 1250 Words”, n.d. https://studentshare.org/biology/1449741-computer-forensics.
  • Cited: 0 times

CHECK THESE SAMPLES OF Computer Forensics in Biology

Forensic Facial Reconstruction

"Physical anthropologists have long been called upon to apply their knowledge of human skeletal biology to practical problems of concern to the medicolegal system.... Applying muscle and skin to the bone needs computer tomography.... Even though computer graphics had been able to render multidimensional help, the original clay modeling is still considered to be the most authentic and useful.... Remarkably, one of the most popular tissue reconstruction methods bears many resemblances with surface fitting techniques used in computer graphics, thus suggesting the possibility of a transfer of the manual approach to the computer....
5 Pages (1250 words) Essay

Essential Skills for Employment as a 21st Century Bio-Scientist

The subcategories of bioscience total thirteen sciences, namely, biochemistry, biomedical engineering, biophysics, botany, cell biology, ecology, food science, forensic science, genetics, immunology, microbiology, molecular biology and zoology.... From the paper "Essential Skills for Employment as a 21st Century Bio-Scientist" it is clear that since a person is required to spend more schooling years to acquire a Ph....
7 Pages (1750 words) Coursework

Abridged Literature Review

Relevant literature is presented under the sections: controlled substance examination, fingerprinting, firearm… s, forensic document examination, forensic psychophysiology, forensic serology, transfer evidence examination, photographic, forensic biology and molecular biochemistry/comparative Deoxyribonucleic Acid (DNA) Analysis, and forensic computer science/cybertechnology The examination of controlled substances is one of the fundamental tasks of forensic science in order to verify the presence of substances which are either regulated or prohibited by law....
5 Pages (1250 words) Essay

Forensic Biology and Chemistry

To apply background in forensic biology and chemistry to access employment in a science field that will promote and enhance laboratory skills, computer skills, and organizational skills.... hellip; I have profound experience in General biology where I undertook laboratory reports, poster sessions, and various research projects.... I also have experience in Genetics chemistry and Cell biology.... Additionally, I have experience in the biology of Microorganisms where I identified unknown bacteria....
1 Pages (250 words) Resume/CV

The Importance of Forensic Botany and How it Relates to Forensic Science

Although our ancestors did not know forensics in its current form, it still existed in those days.... It is a multidisciplinary subject, drawing principles from chemistry, biology, physics, botany, etc.... Traditionally, morphological aspects of botanical specimen identifications were used to provide evidence, but the last two decades have relied comprehensively on the molecular biology side of the botany.... It is called forensic science or just 'forensics'....
12 Pages (3000 words) Research Paper

Magnetic Fingerprinting and Automated Fingerprint Identification

The paper "Magnetic Fingerprinting and Automated Fingerprint Identification" states that most forensic investigators are using magnetic resonance fingerprinting as well as IAFAS due to their speed, accuracy, image quality, and success rate, along with the level of conviction.... nbsp;… Fingerprint recovery from a crime scene is a crucial method in forensic science....
6 Pages (1500 words) Essay

Proving Rape by Forensic Biology

"Proving Rape by Forensic biology" paper describes how a window believe to be holding a latent fingerprint, a blood pattern on a wall, a wet stain on a white garment, and a clump of white cotton fibbers, all encountered during an investigation of the scene of a rape crime can be successfully analyzed… It is important to note that the information gathered from the latent fingerprint on a wall is not conclusive; the person whose fingerprint was found to be the latent fingerprint may not have committed the rape crime....
10 Pages (2500 words) Essay

Understanding Forensic Science

The principle is used in forensics to analyze body fluids such as saliva or blood from a crime scene thus helping in linking a suspect to a crime (Ogle, 2005).... … The paper " Understanding Forensic Science" is a perfect example of an assignment on social science.... nbsp;Forensic palynology is the use of evidence from pollen and spore in legal cases....
8 Pages (2000 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us