StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Forensic Evidence - Research Paper Example

Cite this document
Summary
Discussing computer forensics in the context of law enforcement agencies or in corporate security, it will lead to a conclusion of a subject that covers the utilization of computers to catalog physical evidence…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.4% of users find it useful
Forensic Evidence
Read Text Preview

Extract of sample "Forensic Evidence"

? Full Paper Introduction Discussing computer forensics in the context of law enforcement agencies or in corporate security, itwill lead to a conclusion of a subject that covers the utilization of computers to catalog physical evidence that is analyzed in other forensics techniques including biometric identification, analyzing DNA and dental evidence. Current technological trends have revolutionized the methods of storing data along with different advanced access mechanisms. These systems facilitate law enforcement agencies by providing instant access to these characteristics. Although, computer forensics also facilitates in investigation of crimes within themselves in order to gather evidence associated with criminal activities that breaches violation of an organizations policy. The data can be extracted from storage devices including hard drives, flash drives, memory cards etc (Computer forensics – a critical need in computer, n.d ) Every online user leaves behind logs related to activities that he or she performs online. This digital traceability can reveal activities that are performed by the user on the Internet by identifying who has identified which files along with logs of each website visited. Temporary files can also reveal flash templates and buffered videos. These traceable logs, files, cookies, templates can facilitate a great deal to analyze crimes that are committed from computers and may provide solid evidence against the hacker or cyber-criminal. However, many users trust in files after deleting them from the hard drive but there are many ways and methods via which these files can be recovered. The operating system usually does not delete complete files from the hard drive, even if the user deletes the files from the recycling bin. The files are still present, until they are replaced or overwritten by new files. These traceability factors can lead to aid in forensic investigations and can track down criminals by investigating their computer. For instance, during the execution of a search warrant at the residence of John Robinson who was a serial killer, law enforcement agencies discovered two bodies that were badly decomposed along with seizing of five computers (Computer forensics, n.d ). After investigating computers, it was discovered that the serial killer John Robinson was using internet to find people to schedule a meeting. Afterwards they were killed by sexually assaulting them. These facts were only possible by forensic computing techniques and were not possible by physical evidence and investigation (Computer forensics, n.d ). However, many techniques are associated with forensic computing, few techniques are categorized in to two groups i.e. Graphical User Interface (GUI) based forensic tools and Command line forensic tools (Conklin 2005). The command line tools are relatively small, they can be stored in floppy disks as compared to heavy, and slow GUI based forensic tools. However, command line tools also share some disadvantages in terms of their limitations as they are not capable to identify .zip files and .cab files. GUI based tools provide a graphical user interface and is said to be user friendly because specialized knowledge is not required as compared to command line tools requiring commands on every operation. The disadvantage for GUI based tools is that they are large and cannot be saved in a floppy disk (Conklin 2005). Similarly, organizations also require a proactive approach for threats that may penetrate within the internal network and extracts or expose sensitive information. There are many ways of forensic data acquisition on a network; we will only consider best practices. Network-Based Evidence Acquisition Practices Network management is effective on many vital management functions. If any one of them is not properly configured, effective network management is not possible. Data acquisition is classified as a vital management process that needs to be addresses proficiently. Likewise, Wireshark will only utilize data that is available and produce reports that are in the scope of evidence. For instance, it is possible that Wireshark acquires the data in an imprecise manner because in certain cases, there is a replication in data transmission. Therefore, the metrics will not show the correct picture. Acquisition tools are tailored to detect and process various types of network traffic, if any additional traffic is transmitted to the tool, it will overload the process and many packets can be discarded. Moreover, if any tool initially saves the network traffic to process further, packet duplication can further degrade the packet capture process difficult. Data transmission in a network is received from many interfaces and is also transmitted via a single interface representing many to one relationship. This concludes that the buffer can be overrun on an interface available on a switch. Moreover, congestion will result in packet loss from the switch, as a result of discarded packets and consequently, the tool will identify packet loss and incorrect reports and metrics. Best practice is that the port that is replicating data needs to be configured on the module with the largest buffer size. By following this procedure of best practice, likelihood of packet loss that is residing on the switch port will be minimized and packets will be counted appropriately. Furthermore, this memo will address best practices for data acquisition from switches and by integrating required methods for effective filtering and customization. Consequently, by deploying these methods and methodologies of best practices, facilitate accurate illustration of network traffic, perfect metrics, minimized processing power and maximum data storage. Switch Port Analyzer (SPAN) As per network dictionary “Switched Port Analyzer (SPAN) is a feature of many managed switches that extends the monitoring capabilities of existing network analyzers into a switched Ethernet environment. SPAN mirrors the traf?c at one switched segment onto a prede?ned SPAN port. A network analyzer attached to the SPAN port can monitor traf?c from any of the other switched ports”. This is a feature that is available in Cisco network devices that gives options for network administrators to copy traffic from a physical layer i.e. port on a switch to another port. Likewise, span ports are configured by a session that includes a source and a destination. The monitor session includes two functions i.e. to monitor source of the session and session monitoring of destination. The monitor session source identifies the ports that are physical present for the SPAN to copy data. Moreover, it also illustrates the direction of the traffic that includes the RX and TX. The monitor session destination will also identify the physical ports that the SPAN will consider for copying data. The source of the monitor session is composed of three attributes (Expert data acquisition best practice, n.d): Monitor session number: Differentiates the monitor session from any others on the switch. Monitor session source: Specifies the ports or VLANs from which the SPAN will copy data. Monitor session direction: Specifies the monitor session direction: RX, TX, or both (both by default). Monitor session source defines that the replication of data to the destination includes the source ports that will be associated with L2 or L3 ports. However, both of these ports are usable simultaneously. There is also a constraint which restrict WAN interface to be a representation of a source port. For instance, ATM interface is a good example. Moreover, best practices also restrict the configuration of Ethernet channel ports to be represented as source ports. Furthermore, ports cannot be blended with VLAN to be represented as a source within the same session of monitoring; instead, they will be configured for a physical port or for the VLAN. When source information is configured by using a VLAN, this process is considered to be a VLAN SPAN. VLAN sourcing includes each and every interface on the VLAN that can be monitored effectively. Likewise, the destination data is composed of two separate categories i.e. (Expert data acquisition best practice, n.d) Monitor session number: Differentiates the monitor session from any others on the switch. Monitor session destination: Specifies the physical port(s) to which the data will be mirrored. Destination port caveats: (Expert data acquisition best practice, n.d) A destination port can be any physical port, with release 12.1(13)E and later of Cisco IOS, you can configure the destination port to be a trunk port. This allows you to forward VLAN tags to the data collection device for monitoring purposes. This technique can also be used to filter data leaving the destination port with the “switchport trunk allowed vlan” command. A destination port can only service a single SPAN session and cannot be an Ether Channel port. A monitor session can have up to 64 destination interfaces Port SPAN Port span will facilitate separate interfaces to be represented similar to sources, as it is recommended for an environment where access layer switches are installed. The monitoring of sessions should focus on the interfaces that are connecting the production servers or servers containing business critical applications. By following this best practice, data which is redirected to other servers is not visible to the analyzer and do not struggle on SPAN destination for bandwidth. Future of Digital Forensic Investigation During a presentation at Carnegie Mellon University’s CyLab Capacity Building Program, Dr. Roy Nutter differentiated between forensics and security. He concluded that security includes all the theory and mechanism that is required to design protection for people and resources. On the other hand, forensics triggers when any incident occurs. As security incidents are rising, there will be huge demand for forensic computing professionals in future (, Computer forensics). Moreover, Peterson also concluded that a professional related to forensic computing deals with highly technical subjects and must have patience of a photographer of wild life along with literary skills equivalent to Mark Twain (Computer forensics, n.d ). Reference Switched port analyzer. (2007). Network Dictionary, , 469-470. Expert data acquisition best practice, n.d Retrieved 10/23/2011, 2011, from http://www.scribd.com/doc/53797426/Expert-Data-Acquisition-Best-Practice Computer forensics – a critical need in computer Retrieved 10/23/2011, 2011, from http://www.scribd.com/doc/131838/Computer-Forensics-a-Critical-Need-in-Computer Computer forensics, n.d Retrieved 10/23/2011, 2011, from http://dl.acm.org/citation.cfm?id=1047894 Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Forensic Evidence Research Paper Example | Topics and Well Written Essays - 1250 words”, n.d.)
Forensic Evidence Research Paper Example | Topics and Well Written Essays - 1250 words. Retrieved from https://studentshare.org/information-technology/1433773-acquiring-network-forensic-evidence
(Forensic Evidence Research Paper Example | Topics and Well Written Essays - 1250 Words)
Forensic Evidence Research Paper Example | Topics and Well Written Essays - 1250 Words. https://studentshare.org/information-technology/1433773-acquiring-network-forensic-evidence.
“Forensic Evidence Research Paper Example | Topics and Well Written Essays - 1250 Words”, n.d. https://studentshare.org/information-technology/1433773-acquiring-network-forensic-evidence.
  • Cited: 0 times

CHECK THESE SAMPLES OF Forensic Evidence

Reporting Forensic Evidence

Reporting Forensic Evidence Name: Instructor: Task: Date: Reporting Forensic Evidence It is very critical and essential for any forensic investigator carrying out any form of forensic investigation to be familiar with the types of the data collected to be used as the final forensic report.... For instance, the investigators can employ the manual form of collecting Forensic Evidence or they can employ the computer technology method in the collection of the forensic evidences....
4 Pages (1000 words) Research Paper

Significance of Forensic Evidence

Significance of Forensic Evidence Name: Professor: Course: Date: Introduction Forensic Evidence is anything that has been collected in a scene of crime that gives the description of the way the crime was done.... hellip; Another definition of Forensic Evidence can be evidence that can be used by a law court, especially the evidence that has been obtained via scientific methods like DNA tests, blood tests and ballistics (James & Nordby, 2009)....
8 Pages (2000 words) Research Paper

The Process of Gathering Forensic Evidence

This is a computer hardware toolkit that is used in the performance of very detailed digital examination of Forensic Evidence.... In this stage, the experts have to also come up with the exact location of the evidence so that it can be collected.... It also has the capability of handling multiple file systems as well as come up with the format for the evidence that has been made.... It is built using ubuntu software and is able to combine witness experience to come up with a witness format that is used in hand with advanced forensic format....
4 Pages (1000 words) Essay

Procedures in Collecting Forensic Evidence

Analytical procedures which include comparisons of the financial information with the industry average, past performance of the company, budgeted information, as well as competitor's information (International Federation of Accountants (IFAC), 2009). Observation is also a… This may include looking at a process or activity, for example process of recording of financial data, to consider if there is any errors in that process. The auditor would also evaluate the strength and weaknesses of the internal control system to obtain The auditor would first check the design of the system and if he is satisfied with the design then he goes on checking the operation of the internal control system....
3 Pages (750 words) Essay

Forensic evidence on Major criminal case

The Forensic Evidence introduced in the trial were linked to Timothy Masters, who was the first suspect.... Based on these outcomes, the knife collections, pornography magazines, and artistic drawings of violence were the Forensic Evidence introduced at the trial, allegedly linking Masters to the murder.... hellip; ensic evidence is therefore used as a resource for examining physical evidence and as a rationale for maximizing the overall effectiveness and efficiency in ensuring that the threads of evidence in a case are tied to the suspect (Saks & Koehler, 2005 p....
5 Pages (1250 words) Research Paper

Forensic Evidence of Gunshot Residue

The paper "Forensic Evidence of Gunshot Residue" describes that forensic testing on gunpowder residue has lead to the arrest and conviction of many known suspects involved in shooting cases.... However, the negative of choosing one over the other is the fact that once one of these methodologies have been chosen and implemented, the other test would be useless to incorporate as well due to the evidence already having been affected by the previous test....
11 Pages (2750 words) Coursework

Acquiring Network Forensic Evidence

The paper "Acquiring Network Forensic Evidence" concerns computer forensics in the context of law enforcement agencies or in corporate security, the utilization of computers to catalog physical evidence that is analyzed in forensics techniques including biometric identification, analyzing DNA, etc.... Although, computer forensics also facilitates investigation of crimes within themselves in order to gather evidence associated with criminal activities that breach violation of an organization's policy....
6 Pages (1500 words) Essay

Forensic Evidence Admissibility

This work called "Forensic Evidence Admissibility" describes the particular case with the aspect of admissibility of Forensic Evidence.... The author outlines the HGN test evidence, the standards for admissibility, the application of the laws formulated by the Oregon State in regards to the evidentiary use of HGN tests.... he state of Oregon requested for a pre-trial omnibus, during which it was held that the HGN test evidence was admissible in court to prove that the defendant was driving while under the influence of intoxicants, and to prove that the blood alcohol content for the defendant was 0....
7 Pages (1750 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us