Digital forensics/ electronic evidence

Masters
Essay
Miscellaneous
Pages 1 (251 words)
Download 0
Advancement in technology has made it possible for digital forensic to develop and investigators have found an easier way to capture computer criminals. Digital forensic ensures accuracy is…

Introduction

Theft of personal information is another form of digital crime covered under digital forensic (Johnson, 2006). Majority of internet and computer users have complained about the increased rate of digital crime where money and other crucial information stolen. Damage of intellectual property is also another type of digital crime. In the scene of crime things like those that encrypted files will be retrieved, deletion of significant files and at times tools can also be retrieved at the crime scene.
Improper handlings of electronic evidence can jeopardize with a criminal case adversely. Digital evidence is a new piece of evidence in the court system. Therefore, measures have to be taken to ensure evidence collected through electronic means is well handled and not interfered with to ensure the criminal is proven guilty (Daniel, 2012). Investigators involved in collecting evidence of digital nature ought to have permission to undertake the investigation process. Computers are considered personal therefore; the right procedure should be followed in order to retrieve any form of evidence. In addition, the investigators need to be conversant with computer and electronic operations this will ensure the criminals do not outshine them (Johnson, 2006). Policies with regard to digital evidence should be adhered to prevent interference with the evidence. Digital evidence also recommends that honesty and validity are observed to prevent evidence ...
Download paper
Not exactly what you need?

Related papers

Computer Forensics
We live in borderless world. Although people our bounded by geographic terrain, the World Wide Web has made it possible for people to connect with each other with a click of the mouse. Truly, this is a wonderful world to live.…
Privacy and Digital Investigations
Therefore, upon the detection of suspicious computer incidents, the organization immediately launches a forensics/digital investigation which is fully compliant with a policy which has been jointly drawn up by both the legal and the IT departments. This report will begin with a brief overview of privacy considerations, following which it will describe the organization's policy and highlight both…
Internet Forensics Based On Evidence Gathered With Peep Attacks
It is crucial to swiftly preserve digital evidence and conduct forensic analysis that any useful evidence is seized soon after the cybercrime has been committed. Furthermore, there are two phases of digital forensic analysis to retrieve useful evidence when facing a cybercrime attack in our scheme. One phase observes the Internet attack action, and the other one introduces how to investigate each…
Computer Forensic
The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized [11].…
invistigation Forensics : how to find evidence from an oracle data base?
He typically started to assess the tool’s applicability by testing how rightly it creates a timeline and records the database actions that occurred in the past. Subsequently, the LogMiner’s transformation, interpretation and authenticity of Time Stamp data type were focused on.…
Digital forensics/ electronic evidence
Theft of personal information is another form of digital crime covered under digital forensic (Johnson, 2006). Majority of internet and computer users have complained about the increased rate of digital crime where money and other crucial information stolen. Damage of intellectual property is also another type of digital crime. In the scene of crime things like those that encrypted files will be…
final project
Live data acquisition is a process in which computer forensic experts make a copy of the digital evidence, from a digital device, by running a program (University at Buffalo, n.d). In this process, data is acquired while the computer belonging to the suspect is on. Live data acquisition is necessitated by particular factors, such as prevention of permanent data loss, disk encryption or significant…