StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Computer forenscis - Article Example

Cite this document
Summary
The various Linux distributions are used for basic operations at home or professional services, for example; in forensic labs (Dixon). Linux has…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.8% of users find it useful
Computer forenscis
Read Text Preview

Extract of sample "Computer forenscis"

Linux in Forensics Linux has various distributions that are very popular mainly because of the stability, better security and open source nature. The various Linux distributions are used for basic operations at home or professional services, for example; in forensic labs (Dixon). Linux has distinct advantages in a forensic lab setting; they are; availability and accessibility; the software is readily available on the internet. The source code is provided, and tools are carefully monitored for bugs.

Efficiency; it allows much scripting and automation making it ideal for labs running more casework. Customization and optimization; the source code can be modified; therefore, the OS can be customized to suit the requirements of a particular lab. Support; its Adhoc support is excellent; mailing lists answer calls and provide assistance within minutes. It offers fast implementation of feature and patch requests.Disadvantages; requires retraining, learning Linux takes time and effort, and the command line is not intuitive.

Support; Linux offers no formal support organization. Support queries are direct to the community, and the answer quality varies considerably. Interoperating; interoperating with proprietary technologies is difficult, implementation takes time and may even be incomplete. Volunteer development effort; many projects are in perpetual development stage and may be edgy, poorly documented and abandoned (Wolfe).In a forensic lab setting, both Linux and Windows have advantages and disadvantages. They are different but employ similar tools.

The main difference is the approach taken in obtaining and interpreting the data. Recovery of data is crucial in forensics, and this is where Linux has an upper hand over Windows. Data on Linux is held for months even on heavily used systems. Linux file system avoids file fragmentation, and data remain clustered together. Deleted files are, therefore, easily recoverable on Linux than on Windows. Also, everything in Linux is noted as a file, and this translates to; any transaction occurring in Linux will leave traces (Grundy).

Works CitedDixon, P.D. An Overview of Computer Forensics. IEEE Potentials 24.5 (2005): 7-10. Web.Grundy, Barry J. The Law Enforcement and Forensic Examiners Introduction to Linux. A Practitioners Guide to Linux as a Computer Forensics Platform 3.78 (2008): n. pag. Web. 16 Mar. 2015.Wolfe, Dr.Henry B. Computer Forensics. Computers & Security 22.1 (2003): 26-28. Web.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Computer forenscis Article Example | Topics and Well Written Essays - 250 words”, n.d.)
Computer forenscis Article Example | Topics and Well Written Essays - 250 words. Retrieved from https://studentshare.org/information-technology/1683241-computer-forenscis
(Computer Forenscis Article Example | Topics and Well Written Essays - 250 Words)
Computer Forenscis Article Example | Topics and Well Written Essays - 250 Words. https://studentshare.org/information-technology/1683241-computer-forenscis.
“Computer Forenscis Article Example | Topics and Well Written Essays - 250 Words”, n.d. https://studentshare.org/information-technology/1683241-computer-forenscis.
  • Cited: 0 times

CHECK THESE SAMPLES OF Computer forenscis

Planning Report for the Computer Forensics Lab

Assume that after this module you decide to set up a computer forensics laboratory.... Typical computer forensic laboratories employ between five and ten people.... hellip; In order to set up a new computer forensics lab, seven employees would be hired in total.... Two of these employees will be placed to deal with administrative issues while the other five will be employed to deal with computer forensics work.... In addition to the above, these administrative employees would also be responsible for the safety and privacy of the computer data being investigated (Anderson et al....
3 Pages (750 words) Essay

Operation Ghost Click

computer Crime and computer Forensics Date computer Crime and computer Forensics Cybercrimes have become a common phenomenon across the globe.... hellip; By making use of computer forensics, authorities such as the Unite States Federal Bureau of Investigations (FBI) have in some cases managed to trap and convict the cyber criminals.... Six Estonian nationals who used a virus called DNSChanger to infect millions of computers and manipulate computers without the awareness of the computer owners committed the crime....
3 Pages (750 words) Essay

Suspected Pedophile Cleared by Computer Forensics by John Leyden

Suspected Pedophile Cleared by computer Forensics Your Name Professor Name Subject TABLE OF CONTENTS 1.... Suspected pedophile cleared by computer forensics Introduction The article “Suspected pedophile cleared by computer forensics” by John Leyden is about the case of a suspected pedophile who is proved innocent with the aid of Vogan IT Forensic firm.... The images stored in his computer were a firsthand proof to the police to accuse him as a pedophile....
4 Pages (1000 words) Essay

Computer Forensics: Admissibility of Evidence in Criminal Cases

He explains that what may be regarded as a computer crime in one country may be acceptable in a different country.... This necessitates that a court computer forensics: Admissibility of evidence Newman, R.... computer Forensics: Evidence Collection and Management.... In his book, Newman identifies the stipulations that govern computer Forensics in different countries states worldwide.... He explains that what may be regarded as a computer crime in one country may be acceptable in a different country....
1 Pages (250 words) Annotated Bibliography

Forensic Accounting class discussion

computer forensics refers to the application of computer analysis, as well as investigation techniques, to gather suitable evidence that can be presented in court.... computer forensics has the sole aim of performing a structured investigation while at the same time ensuring that… The evidence has to be maintained in order to find out what exactly took place, as well the person who can be held liable for a fraud carried out on a computer (Kranacher, Riley & Wells, 2011). There are several functions that can be utilized in Forensic Accounting Forensic Accounting computer forensics computer forensics refers to the application of computer analysis, as well as investigation techniques, to gather suitable evidence that can be presented in court....
1 Pages (250 words) Assignment

Electronic Crime in the US

Although it is always difficult to detect hackers, the field of computer forensic helps in detecting this vice.... Apart from the basics of computer protection like passwords and firewalls, computer forensics can detect any sound and digital information that may have been routed out or into the computer system.... Cyber crime: Investigating High-Technology computer Crime....
1 Pages (250 words) Essay

4th Admendment Issue: Computer Forenics Analysis of Thumb Drive

The loss of evidence may compromise the integrity and quality of service the police department computer Forensic Analysis of Thumb Drive computer Forensic Analysis of Thumb Drive The fourth amendment is a clause in the AmericanConstitution outlaws unreasonable searches....
1 Pages (250 words) Assignment

Assessing Forensics Tools

This essay "Assessing Forensics Tools" presents computer forensics that is a very particular field of computing dealing with acquiring information that will be as evidence on handling cases related to administrative issues, criminal and civil.... hellip; Even as the field of computer forensics continues to evolve, means of evaluating the tools also used change as well....
1 Pages (250 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us