StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

The History of Computer Forensics - Essay Example

Cite this document
Summary
The paper "The History of Computer Forensics" highlights that incident handlers performing forensic tasks should have a broad knowledge of forensic principles, guidelines, procedures, tools, and techniques, as well as anti-forensic tools and techniques that could conceal or destroy data…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER99% of users find it useful
The History of Computer Forensics
Read Text Preview

Extract of sample "The History of Computer Forensics"

Download file to see previous pages

Evidence derived from computer is been used in court for almost 30 years. Initially, judges accepted the evidence as no different from forms of evidence they were been already seen. As computer technology advanced, the accepted similarities to traditional evidential material became Ambiguities (Olsson, 2004).2. What is computer forensics computer forensics is a simple application of computer investigation and analysis techniques in the interests of determining potential legal evidence. Evidence might be sought in a wide range of Computer crime or misuse, including but not to the theft of trade secrets, thefts of or destruction of Intellectual property, and fraud.

In other words, computer forensics is the application of the scientific method to digital media to establish information for judicial review. This process usually involves computer systems to determine whether they are or were been used for illegal or Unauthorized activities (Wikipedia, 2006). Mostly, computer forensics experts investigate data storage devices, either fixed like hard disks or removable like compact discs and solid-state devices. The work of a computer forensics expert is to identify sources of documentary or other digital evidence, preserve the evidence, analyze the evidence, and present the finding.

Computer forensics is been done in a fashion that adheres to the standard of evidence that is admissible in a court of law. 3. Scope of Computer Forensic: The scope of computer forensics covers a wide field, which continues to grow as computer Technology proliferates its way into every aspect of modern life. The base computer forensics is recovering data from floppy disks, hard drives, and removable drive cartridges. This also includes searching. The history of computer forensics starts with the first time a system administration had to figure out how and what a hacker had done to gain unauthorized access to explore the system.

In the beginning, the classic hacker breaking into computer systems was more interested in how things work than actually being malicious. As computers evolved from academics to business and government, there was more data and resources at risk. Hackers' incursions became an issue handled through legal channels. While deciding which internal or external parties should handle each aspect of forensics, the organization should consider factors such as personnel and equipment costs for collecting data, the time needed for internal or external teams to respond to incidents, and data sensitivity and privacy issues.

(United States Department of Justice, 2001) IT professionals throughout the organization, especially incident handlers and the first responder to incidents, should understand their roles and responsibilities for forensics. They should be given training and education on forensics, related to the company’s procedures, and they should be prepared to corporate with and assist others when the problems occur for which they were been trained (Nelson, Amelia, & Steuart, 2004). Incident handlers performing forensic tasks should have a broad knowledge of forensic principles, guidelines, procedures, tools, and techniques, as well as anti-forensic tools and techniques that could conceal or destroy data.

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Computer forensic Essay Example | Topics and Well Written Essays - 4500 words”, n.d.)
Computer forensic Essay Example | Topics and Well Written Essays - 4500 words. Retrieved from https://studentshare.org/logic-programming/1506837-computer-forensic
(Computer Forensic Essay Example | Topics and Well Written Essays - 4500 Words)
Computer Forensic Essay Example | Topics and Well Written Essays - 4500 Words. https://studentshare.org/logic-programming/1506837-computer-forensic.
“Computer Forensic Essay Example | Topics and Well Written Essays - 4500 Words”, n.d. https://studentshare.org/logic-programming/1506837-computer-forensic.
  • Cited: 0 times

CHECK THESE SAMPLES OF The History of Computer Forensics

Reliability of Mobile Phone Forensic Evidence

From the paper "Reliability of Mobile Phone Forensic Evidence", mobile forensics is still in its infancy, and analyzing mobile phones for forensic evidence is a cry from the traditional computer forensics models used for extracting evidence from computers, which is now well known to forensic science.... The practitioners of computer forensic quite often need to deal with digital images as a part of the evidence requirements.... Computer forensic practitioners should have an understanding of the characteristics of computer images to identify the origins of the DSC images in question....
5 Pages (1250 words) Essay

Case Projects in Computer Forensics

Case Projects in computer forensics.... computer forensics involves, at least, the basic four processes of identification, preservation, analysis and presentation.... Despite the fact that the Daubert Standard is not directly connected to forensics examination, it sets a good guideline for acceptability of validation reports in courts of law (cited Brunty 1).... On the other hand, preservation and analysis are forensics-tool bases and thus, can be verified and validated....
3 Pages (750 words) Essay

Forensic Computing

Several factors come as constraints along with computer forensics and the first being the costs since all the equipment used in these processes is high tech and state of the art, large investments are inducted into it.... This paper "Forensic Computing" focuses on the fact that the end of the 20th century saw a massive advancement in the field of forensics pertaining to electronic use.... Admissibility is the fact that no rules have been violated as per privacy of the common citizen and all the procedures adopted are in accordance with the laws defined by the governing body of digital forensics....
8 Pages (2000 words) Case Study

The Increased Need for Digital Forensics

The paper "The Increased Need for Digital forensics" highlights that digital forensics, through the field's ability to undermine devious criminal attempts to hide electronic evidence, is yet another reason why law enforcement and judicial systems require expertise in this area.... Digital forensics, according to the Bureau of Labor Statistics, is a specialized private detective who examines various items of technology in the pursuit of locating evidence related to a criminal act (Tucker, 9)....
10 Pages (2500 words) Essay

Computer Forensics: Admissibility of Evidence

In recent years the use of computer forensics has been crucial in proving the guilt or innocence of accused criminals.... This essay "computer forensics: Admissibility of Evidence" examines the searching of personal gadgets and the use of DNA databases that has opened new avenues for investigators.... However, with the prevalence of technology in our everyday lives, computer forensics is an obvious by-product.... Whitcomb in his article, 'The Evolution of Digital Evidence in Forensic Science Laboratories,' describes how computer forensics has grown over the last four decades....
6 Pages (1500 words) Admission/Application Essay

Computer Forensics Professional Certifications

The certification of the professional computer forensic individual from a professional body will assist in legalizing the qualification of computer forensics.... ne of the professional bodies of computer forensics professionals under consideration in the research will include the GIAC Computer Forensics certifications.... The author of the "computer forensics Professional Certifications" paper examines the pre-certification requirements of a computer forensic professional, the factors to gain certification, and the value of computer forensic certification in the cyber forensic career....
5 Pages (1250 words) Research Paper

The Development of DNA Fingerprinting and Computer Forensics

This paper under the headline "The Development of DNA Fingerprinting and computer forensics" focuses on the fact that forensic scientists use all the tools and technologies at their disposal to gather and analyze the evidence from criminal investigations.... The question of civil liberties violations is long-standing, and both DNA profiling and computer forensics occupy a decidedly fuzzy area of investigation and require the utmost of care when scientists are gathering evidence....
9 Pages (2250 words) Assignment

Digital Forensics

In the much-publicized case of Sharon Lopatka, computer forensics technology was employed to trace the victim's killer through her emails.... or any evidence to be admissible in court the concerned investigating authorities must ensure that due process is followed-computer forensics is no exception to this rule.... This is because a chain of well-documented evidence has to be maintained in order to reconstruct a clear history of the happenings of the crime and find the person responsible (Margaret, 2014)Child pornography is an internet crime against children because they are used as sexual objects (Wortley & Smallbone, 2006)....
7 Pages (1750 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us