Computer Forensic case study

Masters
Essay
Miscellaneous
Pages 23 (5773 words)
Download 0
The history of computer forensic starts with the first time a system administration had to figure out how and what a hacker had done to gain unauthorized access to explore the system. In the beginning, the classic hacker breaking into computer system was more interested in how things work than actually being malicious…

Introduction

While deciding which internal or external parties should handle each aspect of forensics, organization should consider factors such as personnel and equipment costs for collecting data, the time needed internal or external teams to respond to incidents, and data sensitivity and privacy issues. (United States Department of Justice, 2001) IT professionals throughout the organization, especially incident handlers and the first responder to incidents, should understand their roles and responsibilities for forensics. They should be given training and education on forensic, related to the company’s procedures, and they should be prepared to corporate with and assist others when the problems occur for which they were been trained (Nelson, Amelia, & Steuart, 2004). Incident handlers performing forensic tasks should have a broad knowledge of forensic principles, guidelines, procedures, tools, and techniques, as well as anti-forensic tools and techniques that could conceal or destroy data. Interaction between incident handlers and IT professionals can be effective in promoting the understanding of forensics tools and in identification potential Shortcomings in forensics capabilities. ...
Download paper
Not exactly what you need?

Related papers

Case study Case Study
An order for specific performance of the contract was appropriate because of two reasons: 1) the Wirraway was not at the time in flying condition, and 2) the plane was in a hangar owned by a third party.…
Computer Forensic case study
While deciding which internal or external parties should handle each aspect of forensics, organization should consider factors such as personnel and equipment costs for collecting data, the time needed internal or external teams to respond to incidents, and data sensitivity and privacy issues. (United States Department of Justice, 2001) IT professionals throughout the organization, especially…
Forensic Evidence
According to Mr. and Mrs. Anderson, Caroline is a college student at the State University of New York and has a part-time clerical job at the university. They do not have the resources to locate their missing daughter, personally; hence, they are seeking the help of NYPD.…
Computer technology advancement in Forensic science
The system was great for its time. System worked well. The image was not of best quality it worked, better then the old Identity kit. Nothing compares to a good forensic composite artist who can draw the image by hand. However, for those of us who aren't so talented with that medium, the computer and software became our medium and the results were excellent. Computer industry changed. The VISATEX…
Computer Forensics
We live in borderless world. Although people our bounded by geographic terrain, the World Wide Web has made it possible for people to connect with each other with a click of the mouse. Truly, this is a wonderful world to live.…
Forensic Handwriting Analysis
The field of scientific handwriting analysis determines the authenticity of a signature or document. On the other hand, Graphology is the study of handwriting analysis that assesses the writer's traits and personality stating that any two writers are highly unlikely to share similar handwriting characteristics as style, (macro feature) and opening in characters, (micro features), smoothness, size,…
Falcon Computer Company - Case Study
The higher management was great in formulating the values to be followed by the employees but only formulation was not the very success of it. The prime influencing factor is in appropriately propagating the values and the support of the management to exercise in practice.…