StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Computer Forensics and Criminal Justice - Research Paper Example

Cite this document
Summary
Full Paper Title Name University Computer Forensics An incident response team is a dedicated group of skilled professionals responsible for identifying, containing and responding to cyber threats. An incident response team is typically called as computer security incident response team that responds to cyber threats or breaches within organizations (Computer security incident response team.2007)…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER95.7% of users find it useful
Computer Forensics and Criminal Justice
Read Text Preview

Extract of sample "Computer Forensics and Criminal Justice"

Full Paper Computer Forensics An incident response team is a dedicated group of skilled professionals responsible for identifying, containing and responding to cyber threats. An incident response team is typically called as computer security incident response team that responds to cyber threats or breaches within organizations (Computer security incident response team.2007). CSIRT is usually incorporated within corporate organizations maintaining large customer databases or federal security systems.

Whenever an incident or a security breach occurs, the team is capable of identifying threats for containing them in a boundary and then initiates a response for recovery (Bhaskar, 2005). However, responding recover from a cyber-threat is not an easy task and is not always possible. Organizations can designate Chief information security officers, information security officers, information security engineers or IT security engineers to be a part of a team. Likewise, it is essential to delegate powers to the team members, as they have to make decisions in real time for taking prompt actions.

Apart from the security personnel, there are other team members as well who play a vital role. Management of the organization has also an important role, as senior members of the management functions must input for making decisions that may impact business goals. Management must assist the incident response team on every step that may incorporate security evaluation, designating or selecting appropriate CSIRT members, developing administrative controls i.e. policies and testing the incident response plan.

The part of the management to play is associated with the authority that will be delegated to the team members for making informed decisions. Similarly, employees associated with the information security domain i.e. Chief Information Security Manager security professionals certified in handling digital forensics are considered to be valuable to the business and the organization because of their competitiveness in handling complexity of these incidents. Moreover, they are also responsible for identifying weaknesses in the IT architecture, calculating damage done, containing the threat, performing digital forensic investigations and recovery.

Moreover, IT professionals are also mandatory in the CSIRT, as they are responsible to safeguard organization’s data. In case of a security breach within an organization, employees associated with the IT function must be updated about the progress of the incident response plan. If employees associated with the IT functions are not in the loop, the evidence may be deleted or be replaced by the backup data. If they are communicated thoroughly along with the technical consequences, they can customize or enable/disable certain options available in applications/systems/networks that may hinder end users during an execution of an incident response plan.

Moreover, auditing function is now considered a premium role in the domain of Information systems auditing. IT auditor is primarily responsible for ensuring processes and procedures are followed or not, policies are followed or not, controls are appropriate and operational or not, conducting post incident reviews for any potential vulnerabilities still not identified. They also play a critical role in a CSIRT. Furthermore, physical security is also a critical domain that requires policing information assets.

It is essential to provide adequate physical security to systems containing critical data, mission critical applications and highly confidential documents. It is possible that a cyber-threat may harm information systems physically. A prime example is a stuxnet virus that embeds itself into a machine code to change voltages of power grids affecting critical infrastructure of a country. A team associated with physical security of an asset evaluates physical damage to an asset and safeguard evidence in between a forensic investigation so that it cannot be altered or deleted.

Apart from these physical security functions, attorneys also play a vibrant role in a legislative domain. The Attorney is responsible for ensuring the originality of the collected forensic evidence against an electronic crime. Moreover, the Attorney also guides organizations for consequences and liability issues for an event. The human resource functions is also involved for issues associated with employees involved in the incident within the organization. However, the human resource is most active when an employee is found to be linked with the incident.

Lastly, the financial auditor holds the ultimate job to calculate the monetary value of the incident, as it is considered to be the most difficult task. It is necessary for the insurance companies, as they need a monetary value for an incident. To address cyber threats, Forum of Incident Response and Security Teams (FIRST) are formed. It is an umbrella organization that is associated with computer security incident response centers around the world to combat cyber-threats, as a collaborative effort is a must to address growing threats around the world (Forum of incident response and security teams.2007). References Bhaskar, R. (2005). A proposed integrated framework for coordinating computer security incident response team.

Journal of Information Privacy & Security, 1(3), 3-17. Computer security incident response team. (2007). Network Dictionary, , 116-116. Forum of incident response and security teams. (2007). Network Dictionary, , 200-200.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Computer Forensics and Criminal Justice Research Paper”, n.d.)
Computer Forensics and Criminal Justice Research Paper. Retrieved from https://studentshare.org/information-technology/1456934-computer-forensics-and-criminal-justice
(Computer Forensics and Criminal Justice Research Paper)
Computer Forensics and Criminal Justice Research Paper. https://studentshare.org/information-technology/1456934-computer-forensics-and-criminal-justice.
“Computer Forensics and Criminal Justice Research Paper”, n.d. https://studentshare.org/information-technology/1456934-computer-forensics-and-criminal-justice.
  • Cited: 2 times

CHECK THESE SAMPLES OF Computer Forensics and Criminal Justice

The Latest from Computer Forensics

In particular, we shall take a look at the developments happening in the field of computer forensics and how law-enforcement agencies are capitalizing on these.... hellip; Then, it proceeds to introduce the field of computer forensics, and the tools and technology that are used in this field for fighting Internet crimes.... The paper finishes the discussion by enumerating applicable laws and notable contributions of computer forensics. We live in borderless world....
7 Pages (1750 words) Essay

The Increased Need for Digital Forensics

Digital forensics, according to the Bureau of Labor Statistics, is a specialized private detective who examines various items of technology in the pursuit of locating evidence related to a criminal act (Tucker, 9).... Digital forensics are also utilized in the business world as a means to provide solutions to certain business issues, however digital forensics for business is far less prevalent than in criminal analysis.... Digital forensics requires the technician to examine devices such as the PDA, laptop or cellular phone in the pursuit of various digital clues which lead to either support or refute claims of suspected criminal activity....
10 Pages (2500 words) Essay

Computer Forensics Challenges

It only applies to governmental actors and to criminal law [3].... Documents maintained on a computer are covered by different rules, depending on the nature of the documents.... An example would be if a warrant is issued for child porn on an individual's computer, but finds records of embezzlement, the embezzlement records could not be used in a court of law.... The exception is if the police could justify obtaining a warrant to search the computer for records of embezzlement....
26 Pages (6500 words) Essay

Characteristics of Computer Forensics

computer forensics is relatively a new area developed in the According to US-CERT (2008), “computer forensics is the discipline that combines elements of law and computer science to collect and analyze data from computer systems, networks, wireless communications, and storage devices in a way that is admissible as evidence in a court of law” (US-CERT, 2008,p.... computer forensics is an important tool for managers and network administrators who handle the security related issues of the computer systems....
5 Pages (1250 words) Essay

Computer Forensics: Admissibility of Evidence

It also shows the evolution of forensics and its need to keep up with similar changing technology.... Many arguments arise as to the reliability and… However, with the prevalence of technology in our everyday lives, computer forensics is an obvious by-product.... Whitcomb in his article, “The Evolution of Digital Evidence in Forensic Science Laboratories,” describes how computer forensics has grown over the last four decades.... This history shows how the need of computer forensics grew into what it is today....
6 Pages (1500 words) Admission/Application Essay

How the Computer Forensics Type of Technology Applied to Detect Crime

hellip; Today, there are many sophisticated solutions like vests to stop bullets, electronic monitoring for surveillance, telemedicine for prisoners so that there is no need to move them, computerized crime maps to catch the crime incidence, and the like, that have greatly improved the criminal justice system.... Among many technologies, some have created great impacts upon the criminal justice system: drug testing technology, DNA testing technology, concealed weapons detection technology, information technology, and computer forensics....
5 Pages (1250 words) Case Study

Forensic Technology

he inquisitiveness to answer questions that have gripped the entire human history including the criminal justice system on a scientific basis is over a century old.... Juan Vucetich in Argentina solved the first criminal cases on a forensic basis by analyzing the bloody fingerprints on a door.... hellip; Forensic scientists are deployed to work in close coordination with expert search teams, forensic entomologists, forensic botanists, forensic archaeologists, forensic pathologists, cyber forensics, and other research fields to find and investigate evidence at crime scenes....
7 Pages (1750 words) Report

Digital Forensics

nbsp; In the much-publicized case of Sharon Lopatka, computer forensics technology was employed to trace the victim's killer through her emails.... or any evidence to be admissible in court the concerned investigating authorities must ensure that due process is followed-computer forensics is no exception to this rule.... "Digital forensics" paper Investigates cyber-crimes like that of Mr.... hellip; Before all the digital evidence retrieved was packaged for transportation, the investigators ensured that every piece of the computer system and its components were properly documented, labeled, marked, photographed, sketched, and recorded....
7 Pages (1750 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us