Digital Forensics/Electronic Evidence - Essay Example


Extract of sample
Digital Forensics/Electronic Evidence

Child pornography destroys the minds of children and at times, it bullies them. Therefore, curbing the problem in time will assist to end this type of computer crime. Theft of personal information is another form of digital crime covered under digital forensic. The majority of the internet and computer users have complained about the increased rate of digital crime where money and other crucial information stolen. Damage of intellectual property is also another type of digital crime. In the scene of crime things like those that encrypted files will be retrieved, deletion of significant files and at times tools can also be retrieved at the crime scene. Improper handlings of electronic evidence can jeopardize with a criminal case adversely. Digital evidence is a new piece of evidence in the court system. Therefore, measures have to be taken to ensure evidence collected through electronic means is well handled and not interfered with to ensure the criminal is proven guilty. ...
Download paper


Digital forensic involves the concept of retrieving information from computer media. Advancement in technology has made it possible for digital forensic to develop and investigators have found an easier way to capture computer criminals. …
Author : major82
Download 0

Related Essays

Electronic Displays
Electronic paper is a more recent electronic display technology (Facchetti and Marks 2010, p213). Cathode Ray Tube (CRT) CRT is a vacuum tube that uses a hot filament to produce electrostatic, magnetic fields, and thermo-electrons to “focus the electrons into a beam attracted to the high voltage anode which is the phosphor emit luminous radiation” (Maxim Integrated Products 2002, p1). Color CRTs generally utilize three electron sources or guns to target blue, green, and red phosphor prototypes to the screen. Electro-Luminescent Display (ELD) EL display is a solid-state display that uses…
8 pages (2008 words) Essay
Computer Forensics
We live in borderless world. Although people our bounded by geographic terrain, the World Wide Web has made it possible for people to connect with each other with a click of the mouse. Truly, this is a wonderful world to live.…
9 pages (2259 words) Essay
Privacy and Digital Investigations
Therefore, upon the detection of suspicious computer incidents, the organization immediately launches a forensics/digital investigation which is fully compliant with a policy which has been jointly drawn up by both the legal and the IT departments. This report will begin with a brief overview of privacy considerations, following which it will describe the organization's policy and highlight both its strengths and weaknesses.…
5 pages (1255 words) Essay
Internet Forensics Based On Evidence Gathered With Peep Attacks
It is crucial to swiftly preserve digital evidence and conduct forensic analysis that any useful evidence is seized soon after the cybercrime has been committed. Furthermore, there are two phases of digital forensic analysis to retrieve useful evidence when facing a cybercrime attack in our scheme. One phase observes the Internet attack action, and the other one introduces how to investigate each case in on-line analysis of sniffing packets and off-line examination of abnormal files. We believe that this analysis model is workable for any other form of Botnets presently being used.…
15 pages (3765 words) Essay
Computer Forensic
The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized [11].…
36 pages (9036 words) Essay
invistigation Forensics : how to find evidence from an oracle data base?
He typically started to assess the tool’s applicability by testing how rightly it creates a timeline and records the database actions that occurred in the past. Subsequently, the LogMiner’s transformation, interpretation and authenticity of Time Stamp data type were focused on.…
2 pages (502 words) Research Paper
final project
Live data acquisition is a process in which computer forensic experts make a copy of the digital evidence, from a digital device, by running a program (University at Buffalo, n.d). In this process, data is acquired while the computer belonging to the suspect is on. Live data acquisition is necessitated by particular factors, such as prevention of permanent data loss, disk encryption or significant losses to the affected people, when the computer is switched off. It is noteworthy pointing out that live data acquisition does not guarantee repeatability.…
5 pages (1255 words) Lab Report
Got a tricky question? Receive an answer from students like you! Try us!