StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Digital forensic investigation - Essay Example

Cite this document
Summary
Digital forensics is a branch of the forensics department which mainly focuses on the recovery of digital information, from various sources such as in the hard drive of a computer. The main focus area of digital forensics is in the cyber crimes that are committed on frequents…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93.4% of users find it useful
Digital forensic investigation
Read Text Preview

Extract of sample "Digital forensic investigation"

Download file to see previous pages

icated and the information blocked or writer blocked so as to prevent the information on the hard drive from being altered or modified (Kaliski, 2006). Analysis: In this process the information which was found in the hard drive is looked at carefully. The investigators try to piece things together at this stage so that they may come up with the necessary evidence which can be presented in the court (Pereira, 2009). This evidence can be retrieved by using various techniques such as key word searches, whereby things such as the list of the names or account numbers and such like things are searched.

This report main task was to look at the involvement of Clyde Barrow in fraud. The investigation also looked at the fact of Clyde Barrow and Bonnie Parker had been communicating. In the investigation we were able to establish that Clyde Barrow was involved in the fraud and that the two suspects had been communicating with each other. It was also established that Clyde Barrow was involved in terrorism activities as well. The evidential facts are as follows: Clyde Barrow was dealing in counterfeit money.

This can be proven by the fact that there were images of the counterfeit money in his hard drive. The images upon investigation, were found to be illegal, i.e. they were not legal tender. Clyde Barrow and Bonnie Parker not only knew about each other, they had been communicating via e-mail. In our investigations we were able to establish that the two had in fact sent each other an e-mail. If for instance we had found an e-mail from Bonnie Parker to Clyde Barrow and then Clyde Barrow had not replied it, Clyde Barrow could have stated that he did not know Bonnie Parker.

In such a case we would not have had proof of the two individuals having prior knowledge about the others existence. Fortunately for us these two had sent each other e-mails about a certain deal meaning they were business partners in the fraud. This is as shown in the appendices we have put forth. How can we

...Download file to see next pages Read More
Tags
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Digital forensic investigation Essay Example | Topics and Well Written Essays - 5000 words”, n.d.)
Retrieved from https://studentshare.org/miscellaneous/1618705-digital-forensic-investigation
(Digital Forensic Investigation Essay Example | Topics and Well Written Essays - 5000 Words)
https://studentshare.org/miscellaneous/1618705-digital-forensic-investigation.
“Digital Forensic Investigation Essay Example | Topics and Well Written Essays - 5000 Words”, n.d. https://studentshare.org/miscellaneous/1618705-digital-forensic-investigation.
  • Cited: 2 times

CHECK THESE SAMPLES OF Digital forensic investigation

Universal Plug and Play and Its Weaknesses

Some of the main devices in which universal plug and play devices are used include printers, media servers, routers, digital video recorders (DVRs), computers, and even security cameras (Vaughan-Nichols 2013).... The assignment "Universal Plug and Play and Its Weaknesses" investigated that many routers are still shipped with grave security bugs, new exploits are coming into the fame where security flaws in Universal Plug and Play devices are turning up into dangerous issues for the systems....
12 Pages (3000 words) Assignment

Digital Forensics/Electronic Evidence

digital forensic involves the concept of retrieving information from computer media.... Advancement in technology has made it possible for digital forensic to develop and investigators have found an easier way to capture computer criminals.... … digital forensic ensures accuracy is observed and criminals are brought to justice.... The three types of crimes covered under digital forensic include; child pornography which is the most diverse type of digital crime....
1 Pages (250 words) Essay

Policing and the Force Control Room

Response and recovery processes should be used by police to conduct an effective initial investigation in an emergency or incident.... Response process includes reaction, rescue and retrieval and investigation phases while recovery process includes relief and remediation phases....
6 Pages (1500 words) Essay

Validation of Forensic Tools and Software

Validation enables the legal community to match a forensic tool with the nature of investigation and types of data to be collected.... The paper "Validation of forensic Tools and Software"  explains how the tools are validated and the information required in a tool validation report.... A forensic tool validation report focuses on how the report could be used to support the findings of a forensic examination....                … forensic tools are used in investigating security issues in various ways....
7 Pages (1750 words) Coursework

The process of investigating

Proceedings of the Fourth digital forensic Research Workshop.... An ideal investigation process is comprehensive in a bid to figure out issues involved, thus leading to personal growth in a way of approaching issues.... investigation being a systematic process, it ensures that there is no crucial part of the process that is left out.... The… The dynamics involved in the investigation are crucial to both the person investigating and the client involved because it provides a vast experience....
2 Pages (500 words) Essay

Overview of digital forensics at NIST

Due to the increased computer related crimes, it is a fundamental requirement for any organization to employ these digital forensic skills to establish and solve their security issues.... Use of these forensic techniques provides an additional assistance to the organization since it helps in troubleshooting, identification and repair of operational issues within a system, reviewing of the operating systems (Barnett, par.... forensic Focus Journal....
1 Pages (250 words) Article

The Difference between Forensic and Security Evidence

These methods of tracing can facilitate in forensic investigation to trace down the criminal by investigating the computer system used by the criminal.... Computer forensic also helps in the investigation of a crime and keeping an eye out for the transgression of organizational policies.... The paper "The Difference between forensic and Security Evidence" concluded all mechanisms required for designing protection are included in security while forensic prompt after an accident....
6 Pages (1500 words) Literature review

Easy Retrieval of Data from Hard Disk Drives

he main reason for the development of this computer forensic project is to assist in the quick and effective investigation procedures required during a forensic investigation.... This involves the investigation of computer crimes, etc.... Therefore, because the computer hard disk is capable of storing millions of data on anything, it becomes very tedious for the forensic investigator to search for the exact data that is needed for the investigation (Volonino & Anzaldua, 2009)....
7 Pages (1750 words) Term Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us