StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Case Projects in Computer Forensics - Essay Example

Cite this document
Summary
Validation is the process of determining whether a technique or procedure used in arriving at a finding is reliable and effective. It entails the employment of a series of experiments…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97.6% of users find it useful
Case Projects in Computer Forensics
Read Text Preview

Extract of sample "Case Projects in Computer Forensics"

Download file to see previous pages

Despite the fact that the Daubert Standard is not directly connected to forensics examination, it sets a good guideline for acceptability of validation reports in courts of law (cited Brunty 1). In order to determine the validity of the findings in question, it is vital to determine from the police investigator the exact procedure he/she took as well as all the forensic tools he/she used in examining the computer data. In the Digital Evidence discipline, it is fundamental that the examination of procedures include a complete understanding of the methodology used so as to determine its specificity, limitations and margins of error.

The validation of forensic tools is conducted to verify that they did not alter, add or delete any of the original data. (Barbara 4). Computer forensics involves, at least, the basic four processes of identification, preservation, analysis and presentation. Since identification and presentation depend on the skills of the investigator they cannot be subjected to the validation process of the computer laboratory. On the other hand, preservation and analysis are forensics-tool bases and thus, can be verified and validated.

Preservation entails forensic copy, verification, write protection and media sanitation while analysis involves the processes of searching, file rendering, data recovery, decryption, file identification, processing, temporal data, and process automation (Guo et al 2009, pp. S-15-S16). Validation and verification of electronic evidence requires mathematical technique primarily to determine their error ratio. One way of doing this is to split a sample data into subsets, to be called model subsets, and compare them to the remaining subsets.

Next, the file system should be examined remembering that file systems have two layers: abstract and; low level. When examination had focused on the abstract level, it is most likely that the low level evidence has been overlooked. To determine if this is the case, the file system image should be examined and layer 1 obtained. From layer 1, layer 2 should be inferred and this inferred layer should be compared to the actual layer 2 and the discrepancies noted. All other file systems are then examined similarly and the average error ratio obtained.

To continue with the validation, a mathematical formula must be adopted for each file system that consists of a weighted summation of every layer. The following is an example of a formula of FAT12: Er = 0.05(L1) + 0.1(L2) + 0.05(L3) + 0.1(L4) + 0.2(L5) + 0.2(L6) + 0.3(L7) A FAT12 file system, a file system commonly used in most computers, has seven layers: boot sector values; FAT and data areas; FAT entries; clusters; formatted cluster content; linked list of clusters; all directory entries. Each of these layers must be examined for their respective abstract and lower-level, a forecast lower level layer developed with the help of the abstract and the predicted lower-level compared with the original lower-level layer and error ratio is stored.

At the end, all stored layer ratios must be placed into a weighted formula similar as above and an average error ratio for the file system obtained. This examination would establish the extent of the discrepancies in the previous examination (Sremack 2003). Case Project 14-3 Several characteristics distinguish a technical/formal paper from other types.

...Download file to see next pages Read More
Tags
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Case Projects in Computer Forensics Essay Example | Topics and Well Written Essays - 750 words”, n.d.)
Retrieved from https://studentshare.org/environmental-studies/1422865-case-projects
(Case Projects in Computer Forensics Essay Example | Topics and Well Written Essays - 750 Words)
https://studentshare.org/environmental-studies/1422865-case-projects.
“Case Projects in Computer Forensics Essay Example | Topics and Well Written Essays - 750 Words”, n.d. https://studentshare.org/environmental-studies/1422865-case-projects.
  • Cited: 0 times

CHECK THESE SAMPLES OF Case Projects in Computer Forensics

Processing the Crime Scene and Establishing Identity

There were others with the police to take fingerprints, analyze DNA samples, footwear experts, and another person who looked after computer forensics.... The computer forensics was only present to see first hand the body position of the deceased.... The forensics report would have to wait as it came under analysis that took place at the general hospital.... It is an open and shut case, as the mother has named the suspect.... She was sure it was a case of spiked drinks....
2 Pages (500 words) Case Study

Electronic Monitoring System Implementation

Since electronic monitoring as well comprises utilize of computer forensics, a comparatively innovative discipline as well as a significant progression in the wider areas of computer evidence and electronic monitoring (King, 2009).... Up-to-date technologies put together it feasible for organizations to view numerous activities of their worker's occupation, predominantly on computer terminals, telephones in the course of voice mail, electronic as well as when workers are making use of the Internet....
7 Pages (1750 words) Case Study

Digital Forensic Incident Response for American Marketing Systems

hellip; In the current digital world, incidences in computer use continue to bear a high probability to affect financial reports.... The paper "Digital Forensic Incident Response for American Marketing Systems" gives reveal the existence of skimming culprits and the skimming procedure....
13 Pages (3250 words) Case Study

Tracking the Cybercrime Trail

The rate at which people and organization are using computers has increased highly.... There are risks involved in using computers and these risks have also been on the rise.... Cybercrime is one security risk that has been… This fraud occurs as a result of increased usage computers and internet....
3 Pages (750 words) Case Study

International Business Law

This work called "International Business Law" focuses on the case within the jurisdiction of an international court of justice.... The author outlines in this case that weapons of mass destruction like nuclear bombs are not developed in the space.... nbsp;… The case presented is the opinion of all member treaty was signed for the use and exploration of space was bringing conflicts among the superior state (Zines 2008).... It has not, in any case, breached the terms of the treaty by occupying the space....
8 Pages (2000 words) Case Study

FAT32 File System for Computers

For this reason, when considering a file system for use on a computer in a workgroup, a user needs to choose a file system that has high-security features.... The paper 'FAT32 File System for Computers' focuses on Mueller that notes that the FAT32 system and NTFS are some of the most common file systems in use today....
5 Pages (1250 words) Case Study

Managing Risks for IT Managers, Auditors, and Investigators

Forensic artifacts form an important role in computer systems.... Forensic artifacts form an important role in computer systems.... Shell bags, therefore, play a very important role in the forensics of windows 7.... … The paper “Managing Risks for IT Managers, Auditors, and Investigators” is a fascinating case study on information technology.... The paper “Managing Risks for IT Managers, Auditors, and Investigators” is a fascinating case study on information technology....
12 Pages (3000 words) Case Study

Environmental Scanning Strategy of AlienVault

Started by founders loved finding solutions around computer problems, AlienVault has emerged a leading computer security firm.... Started by founders loved finding solutions around computer problems, AlienVault has emerged a leading computer security firm that specializes in creating vitals security solutions that are not only affordable but also effective in combating present and future threats.... Unlike other computer security firms, AlienVault stands out because it makes use of a collaborative stance that allows the sharing of information between users and information security (Cohan, 2012)....
16 Pages (4000 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us