StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Current Developments in Forensic Computing - Report Example

Cite this document
Summary
This report "Current Developments in Forensic Computing" discusses information technology that has resulted in new possibilities for behavior. It is introducing changes that create new ethical issues to be debated on and resolved by society…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97% of users find it useful
Current Developments in Forensic Computing
Read Text Preview

Extract of sample "Current Developments in Forensic Computing"

? Current Developments in Forensic Computing Inserts His/hers Inserts Grade Inserts 08, 12, Introduction Computers have become more powerful with greater CPU speed and high hard drive capacity due to high-tech revolution in ICT such as wireless and internet networks, this has resulted in new ways of disseminating information . The convergence of that technology and the continued use of computers globally have brought about many benefits to mankind. However, the tremendous technical development in computers provides avenues for abuse and opportunities for committing crimes. New risks and social harm to users o f these computers has also increased. The users live with fear of hackers breaking into their accounts, computer systems, steal information, change data and cause devastations. The emergence of computer crimes which is highly technical in nature has led to the creation of a new branch of forensic science known as computer forensics derived from the practice of forensic medicine ( Berghel, 2003; Gladyshev, 2004). The following part of this paper presents the definition of computer forensics then the currents developments in this field and finally the effects of various factors like economic, social, political and cultural factors on computer forensics. Definition of computer forensics From the definition of various authors, forensic computing can be summarized as the legally acceptable process primarily involving identification, preservation, analysis, and presentation of digital evidence as stipulated by court (Yasinsac, 2003; Garber, 2001; Patzakis, 2003). The first step in forensic computing is the identification of digital evidence. This entails finding where it is stored, and how it is preserved which is a vital process to determining how it would be recovered. The next step is the preservation of digital evidence, then its analysis and finally the actual presentation in a court of law. Computer forensics has been defined as the use of scientifically proven and derived methods for preservation, collection, identification, documentation, analysis and presentation of digital evidence derived from a digital source for purposes of ensuring the reconstruction of events found to be crimes, or helps to foresee unauthorized actions that can disrupt planned operations (Palmer, 2001). Current Developments This part of the paper seeks to explain current developments in forensic computing. Traditionally, forensic investigation was done on a forensic copy of an item of the medium which was captured. When smaller networks existed and the capacity of servers was lower than now, removal of each drive and image separately was perfectly acceptable. Though these methods have not been fully discarded, it has been necessary to adopt new methods and approaches to the forensic computing due to extended networks, high capacity data storage and cloud computing. New methodologies as well as tools have been developed and undergone constant review (Duren, 2002). The methodology which is used to capture image into forensic image while the target system is still running normally is known as live forensic. The live forensic can alter some parts of the original media but the disruption must be kept at the minimum levels. The ACPO Guidelines state that computer forensic investigators may be able to glean further evidence from a machine while it is still in its running or ‘live’ state. The available information includes network connectivity and volatile memory-resident data. Caution must be taken to avoid unnecessary alterations to the evidence. Forensic computing has seen rapid advances in the operating systems (OS) design and its functionality – from text based interface of DOS to the Graphical User Interface (GUI) of operating systems such as windows and Unix . The operating systems have become larger, powerful and more user friendly with the advent of the Graphical User Interface. Electronic disclosure is an emerging application in computer forensic industry. It refers to the unveiling of information in discovery of information in judicial proceeding especially pertaining to electronic information exchange. Computer forensic investigation and electronic disclosure differ in that e-discovery is wider and can handle larger amounts of data over a short period of time. On the other hand, computer forensic is more channeled field of evidence. Both disciplines are concerned with the presentation of evidence for proceedings in a court of law (Waden, 2010). Another development in forensic computing is the triage. This involves gaining access to a machine or a network by connecting up an investigator’s laptop system. The investigator is then able to view what is going on in the target machine, the running processes, contents of physical memory and the stored data, without physically connecting the machines. An image can be captured but this method cannot be used to conduct a complete examination of events. It is possible to capture what is in a computer memory. There are available tools that will analyze this image and allow investigators to conduct searches and produce results in formats that can be easily read by investigators in the same as manner an image in the hard drive or other mediums. Advances in microelectronics have allowed microprocessor to become more powerful and smaller in size. It has not only become faster but also more capable and storage chips have increased their capacity significantly. Such developments have a significant impact on forensic analysis. Small electronic organizers are capable of storing and processing significant quantities of data, which may have value in evidentiary investigation. The advantage of such devices is seen in the drug related investigations. New development in forensic science has allowed investigators to visualize fingerprints on metal services even after the prints have been removed. Dr John Bond explains that this is possible after a study that showed that fingerprints can corrode metal surfaces leaving an imprint even if the metal surface were wiped after a crime. For example, the technique could be used to discover the fingerprint that had been deposited on a caliber metal cartridge case before it is fired. Social and Ethical effects in relation to current developments in computing and information technology field The global positioning system technology is a major advancement in the field of information systems. It equips every vehicle or person they monitoring with a tracking device. GPS receivers can be incorporate into mobile phones, motorcars, among other properties as they use information from a satellite signal to evaluate their own positions. Location tracking has been very useful but it also has disadvantages. The information could be misused. For example, position information could help locate where a car has broken-down, but can be misused improperly by tracing the whereabouts for a driver during lunch hour (Bitpipe, 2005). Similarly, radio-frequency identification (RFID) tags in items have the same disadvantages. RFID are composed of miniature silicon chips embodied with tiny antennas able to send message to and receive from RFID readers especially while on mobile objects (Waden, 2010). For instance, a company can remotely pinpoint the exact time up to the second, when a product departs from its stores observe more actions of the consumers buying the products (Mel Duvall, 2006).The diagram below shows the benefits and the areas that calls for attention in the case explained here. Other ethical issues brought about by widespread information technology include uncovering accountability for the repercussions of information systems,enacting standards to protect the safety of individuals and society, and preserve values and institutions considered as being essential to quality of life in a society. The ethical dilemma one may face as an information technology manager is typically reflected in social and political debates. This relationship is shown in the diagram below. The trends in information technology that gave rise to ethical issues include the doubling of computer power, increase in data storage capacity, data analysis advances as well as networking advances and the internet. The doubling of computer power has made it possible for most organizations to utilize information systems for their production processes. As a result, dependence on systems and exposure to system errors and decreased data quality has been more frequent. The same systems that lead to greater production create opportunities for abuse. Advances in the techniques of storage as well as the greatly declining costs of data handling are responsible for multiplying databases on individuals. These advances have made violation of individual privacy be cheap and effective. For example, the major search engines like Google, yahoo, MSN, American Online, just to mention but a few have maintained a million search histories on users who use internet daily. These become an easy target for private or public firms, government agencies and private investigators. Advances in data analysis for large quantities of data are another trend that raises ethical concerns because companies are able to find out much detailed person l information about individuals. The credit card purchases, telephone calls, banking records, video rentals, mail-order purchases, visits to web to read materials, use of search engines, and write blogs, the list continues, are ways to generate information about oneself. Put together, this information could reveals one’s habits, tastes, preferences and interests as well as political views. The creation of electronic dossiers of detailed information on individuals using computers to compile data from multiple sources is called profiling. For example, DoubleClick, an advertising broker on the internet is allowed to track activities of visitors to various web sites in exchange for revenues from advertisements based on the information gathered. Over time, Double-click can create a detailed profile of persons including their computing habits, spending on the Web. Credit card purchases can avail personal information to market researchers, telemarketers, and even companies. Consequently, information technology advances have negatively impacted on invasion of privacy (Ash, 1998). Current developments in encryption techniques combined with advances in processing technology are relatively secure for the everyday user. However, there is an increase in the use of encryption by offenders everywhere. It has been used to hide illegal images of child pornography and other criminal activities. Advances in communication technologies have made complex encryption products widely accessibility; this has presented a challenge to forensic computer examiner. In summary, information technology has resulted in new possibilities for behavior. It is introducing changes that create new ethical issues to be debated on and resolved by the society. High computing powers, storage capacities, and data analysis and network capabilities has the ability to expand individual as well as organizational reach, furthermore magnifying their impacts. The advancement in the technology threatens personal privacy as data flowing over the internet can be monitored at many points. Internet makes intellectual protection of property more difficult since digital material can be easily copied and transmitted to many different locations over the net. Different Web pages can be created easily using contents from other sources or rather Web sites without consent from owners. Errors in large computer systems are hard to eradicate completely. These errors can retrospectively negatively impact on corporations and individual alike, making it impossible for social practices and prevailing laws unable to establish accountability for these problems. Use of computers widely increases chances for computer crime games and computer misuse. Health related problems related to computers include stress injury, computer vision syndrome, and techno stress. Bibliography Animesh, A., Pinsonneault, A. Sung-Byung, Y., & Wonseok, O 2011, An Odyssey into Virtual Worlds: Exploring the Impacts of Technological and Spatial Environments. MIS Quarterly, vol. 35, no. 3, 789. Ash, P 1998, Personal Computers in forensic psychiatry; Journal of the American Academy of Psychiatry and the Law, vol. 26, no. 3, 459-466. Berghel, H 2003, Digital village: The discipline of Internet forensics. Communications of the ACM, 46 (8). 15-20. Casey, E 2002, Practical Approaches to Recovering Encrypted Digital Evidence. International Journal of Digital Evidence, 1 (3). 1-26. Ciardhuain, S. O. 2004. An Extended Model of Cybercrime Investigations. International Journal of Digital Evidence, 3 (1). 1-22. Duren, M 2002, Can Digital Evidence Endure the Test of Time? In Proceedings of the 2nd Digital Forensics Research Workshop 2002, 1-7. Garber, L 2001, Computer Forensics: High-Tech Law Enforcement. IEEE Computer Society's Computer Magazine, 34 (1). 22-27. Gladyshev, P 2004, Formalising Event Reconstruction in Digital Investigation, Phd. Dissertation, Department of Computer Science, University College, Dublin. Gladyshev, P. and Patel, A. 2004. Finite state machine approach to digital event reconstruction. Digital Investigation, 1 (2). 130-149.  Hilton, K 2006, A ’Criminal Personas’ approach to countering criminal creativity; A journal. Crime Prevention and Community Safety, Vol. 8, no. 4, Oct, 2006. pp. 248-259. James, B 2009, How to use computer-based reports; Oxford handbook of personality assessment.  693-706. James, L 1983, A computer –supported information system for forensic services; Journal article Hospital & Community Psychiatry, vol. 34, no. 5, 451-454. McKemmish, R. 1999. What is forensic computing? Trends and Issues in Crime and Criminal Justices (118). 1-6. Mohay, G., Anderson, A., Collie, B., Vel, O. d. and McKemmish, R. 2003. Computer and Intrusion Forensics. Artech House, Boston. Palmer, G 2001, A Road Map for Digital Forensic Research. The MITRE Corporation. Yasinsac, A. E., R.F.; Marks, D.G.; Pollitt, M.M.; Sommer, P.M. 2003. Computer forensics education. Security & Privacy Magazine, 1 (4). 15 - 23. Patzakis, J 2003, Computer Forensics as an Integral Component of the Information Security Enterprise. University College Dublin. Waden, I 2010, Computer forensics and the presentation of evidence in criminal cases: Handbook of Internet crime, 603-630. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Current Developments: Forensic Computing Essay Example | Topics and Well Written Essays - 1750 words”, n.d.)
Current Developments: Forensic Computing Essay Example | Topics and Well Written Essays - 1750 words. Retrieved from https://studentshare.org/information-technology/1439445-current-developments-forensic-computing
(Current Developments: Forensic Computing Essay Example | Topics and Well Written Essays - 1750 Words)
Current Developments: Forensic Computing Essay Example | Topics and Well Written Essays - 1750 Words. https://studentshare.org/information-technology/1439445-current-developments-forensic-computing.
“Current Developments: Forensic Computing Essay Example | Topics and Well Written Essays - 1750 Words”, n.d. https://studentshare.org/information-technology/1439445-current-developments-forensic-computing.
  • Cited: 0 times

CHECK THESE SAMPLES OF Current Developments in Forensic Computing

Anti-Forensic Technologies

This paper ''Anti-forensic Technologies'' tells that There has been a wide usage of anti-computer forensics all over the world.... This paper takes an overview of, and an analysis of the most widely used anti-forensic techniques.... Problem Statement In recent s, there has been a sharp increase in the number of anti-forensic techniques used by criminals in frustrating investigative processes....
12 Pages (3000 words) Essay

Abridged Literature Review

Several studies revealed significant progress in the development of fingerprinting in forensic science, such as the development of an enhanced minutiae-extraction algorithm for an automatic identity-authentication system and a scalable multimedia fingerprinting forensics (Jain, Lin, Pankanti and Bolle, 1997; Lin, Zhao and Ray Liu, 2006).... The abridged literature review synthesizes key researches related to the topic of the proposed dissertation on the relative utility of the forensic sciences....
5 Pages (1250 words) Essay

WE 7 AL&Resarch Paper Responses

The principles actually stand as the core of forensic fingerprint analysis and show a deeper understanding of the act.... SokalskiForensic fingerprint analysis has been accurately exhausted right from its initiation, development and the current use.... Indeed it is significant to note the aspect of crime and law enforcement in relation to familial DNA....
2 Pages (500 words) Essay

Current and Future Cybercrime Threats

The paper "current and Future Cybercrime Threats" highlights that the members of the task force will be required to work as a team and also partner with the public as well as other federal agencies and private organizations so that it can accomplish its mission of fighting the cybercrime menace....
10 Pages (2500 words) Coursework

The Cyber Threats in Saint Louis County

The paper "The Cyber Threats in Saint Louis County" discusses that the development of information technology has been driving the world towards becoming more digitalization.... The digitalization of the world has led towards the emergence of the new and potential threat of cyber-war.... hellip; Computer Fraud and Abuse Act (CFAA) must be systematically reviewed by the county officials and accordingly, new provisions must be framed....
9 Pages (2250 words) Case Study

Mobile Digital Forensics

Mobile digital forensic is simply a branch of the digital forensics that deals specifically with the process of getting digital evidence from mobile technologies using sound forensic conditions (Marshall, 2008).... It is important to note that the proliferation of several mobile phones and related consumer electronics and technologies prompted the need for forensic study and examination of these devices in order to enhance their security and use (Sammons, 2012)....
6 Pages (1500 words) Research Paper

Defining Digital Forensic Examination and Analysis Tools Using Abstraction Layers by Carrier

The paper "Defining Digital forensic Examination and Analysis Tools Using Abstraction Layers" will seek to establish whether the research offered new understanding and reliable information regarding the field of digital forensic examination.... nbsp; Introduction Carrier's (2003) paper addresses a number of problems in the research; for instance, they utilize abstraction layers to identify where digital forensic tools can bring in errors and offer requirements that the tools have to follow....
8 Pages (2000 words) Literature review

Issues in Cyber Forensics Affecting ICT

Whilst the country's constitution presents the legal system platform, hasty developments in the ICT sector has offered fresh issues with regard to the interpretation of the constitution.... The forensic data analysis essay seeks to provide an insight into current issues in cyber forensics affecting the ICT industry, forensic examiners, and the legal fraternity....
14 Pages (3500 words) Literature review
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us