StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Forensics Project 2 - Research Paper Example

Cite this document
Summary
Forensics Research Project 2 Generally Acceptable Tactics for the Preservation of a Computer and Its Data Computer data prevention can be regarded as an important task in any organization. In general, there are various acceptable tactics to for the preservation of computer and its data…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.7% of users find it useful
Forensics Research Project 2
Read Text Preview

Extract of sample "Forensics Project 2"

Download file to see previous pages

It can be stated that the aforesaid tactics would generally provide broader explanation to various legal aspects relating to the preservation of a computer and its data. Key Steps to Ensuring Legal Success in a Courtroom in a Forensics Case In order to determine the key steps ensuring legal success in a courtroom in a forensics case, it can be affirmed from a broader outlook that forensic readiness is often represented as the capability of an organization to increase its prospective to use modern digital evidences and at the same time, reducing the costs of an investigation by a certain degree.

In this similar concern, the key steps towards ensuring legal success in a courtroom in a forensics case have been outlined below. Describing the business circumstances that need digital evidence Identifying current sources & different kind of potential evidence Determining the evidence based collection obligation Establishing a strategy for secure storage plan & handling of possible evidence Identifying the circumstances when a full formal investigation need to be initiated Documenting an evidence-related case explaining the incident and its manifold impact Ensuring legal appraisal to take necessary actions in response to the happening of any incident (Rowlingson, 2004).

Conditions That Require Inclusion of Law Enforcement With regard to conclude the conditions that require inclusion of law enforcement, it can be affirmed that computer crime may be conducted through the violation of the policies associated with information technology relating to the preservation of a computer and its data. Generally, there pertain numerous conditions of crime related to the information technology that lays the requirement of the inclusion of law enforcement agencies. In this regard, according to Section 13 of the Cybercrime Prevention Act 2012, law can be enforced against any individual linked with preservation of computer data.

The truthfulness of traffic data & subscriber information relating to communication services shall be preserved for a minimum of six months. Moreover, content information shall likewise be preserved for a period of six months from the date of the order received from law enforcement authorities obliging its preservation. It can be stated that law enforcement system may provide extensions for the conduct of the aforesaid activities. It has been apparently observed that one of the conditions that require inclusion of law enforcement is that once computer data is preserved, conveyed or stored by a service provider, the data would be accessible only to authorized users It is the service provider who requires to preserve digital data as well as to keep those confidential and most significantly maintain their compliance by a certain degree.

It is to be affirmed that if any computer operator violates or not comply with the order provided by the service provider, then the respective task will be regarded as a crime as and the operator will be punished under section 13 of the Cybercrime Prevention Act 2012 (The Office of the President of the Philippines, 2012). Possible Actions to Protect the Employer In accordance with the mentioned case, one of the possible actions could be the introduction of various data prevention plan which might protect the employer by a certain degree.

In this similar concern, it can be affirmed that the employer can take the help of a law enforcement group for collecting as well as

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Forensics Research Project 2 Paper Example | Topics and Well Written Essays - 750 words”, n.d.)
Forensics Research Project 2 Paper Example | Topics and Well Written Essays - 750 words. Retrieved from https://studentshare.org/information-technology/1483547-forensics-research-project
(Forensics Research Project 2 Paper Example | Topics and Well Written Essays - 750 Words)
Forensics Research Project 2 Paper Example | Topics and Well Written Essays - 750 Words. https://studentshare.org/information-technology/1483547-forensics-research-project.
“Forensics Research Project 2 Paper Example | Topics and Well Written Essays - 750 Words”, n.d. https://studentshare.org/information-technology/1483547-forensics-research-project.
  • Cited: 0 times

CHECK THESE SAMPLES OF Forensics Research Project 2

Investigation Forensics - How to Find Evidence from Oracle Data Base

military medical project-- Chinese medical equipment Journal 2008).... The register program was the sub program of the project.... military medical project-- Chinese medical equipment Journal 2008).... Moreover, one more research was conducted by (Pucciani, Domenici, Donno, & Stockinger, 2010) that was related to a performance study on the synchronization of heterogeneous Grid databases using ‘CONStanza'....
5 Pages (1250 words) Research Paper

The Computer Forensics Processing Method

forensics research project 3 Process Framework Description Computer forensics processing method can be regarded as one of the effective and most indispensable approach for the modern organizations which tends to prevent the misapplication of the organizational resources by a certain degree....
4 Pages (1000 words) Research Paper

The Accreditation Process for Criminal Forensic Laboratories

"Cash and his colleagues created software they called MFISys (pronounced EMPHASIS), for mass fatality identification, for the 9/11 project.... The paper "The Accreditation Process for Criminal Forensic Laboratories" discusses that In the past two decades that DNA evidence has been used to clear those falsely accused of crimes, 328 defendants have been exonerated: over half of these cases were cleared by DNA evidence....
8 Pages (2000 words) Research Paper

Identity Theft Computer Forensics to the Rescue

The author of this essay "Identity Theft Computer forensics to the Rescue" focuses on the identity theft and online consumer protection.... As the text has it, they have become exceptionally significant areas in technological studies demanding special consideration.... hellip; This report is a discussion about identity theft....
10 Pages (2500 words) Research Paper

Software Engineering Principles for Forensic Integrity of Digital Forensics

Digital forensic software development is a delicate software development process that requires an The methodologies and principles will be reviewed using a mixed research approach.... Qualitative and quantitative research methods will be used in different stages of the study....
4 Pages (1000 words) Research Proposal

DNA Profiling and the Related Ethical and Personal Issues

This paper presents DNA, DNA Profiling, forensics, Predicting the Physical Characteristics, which is having applications in many 'spheres' of human lives.... It plays a key role in the 'birth' of human lives and that role even extends after death.... DNA's role after death is to find out nature....
9 Pages (2250 words) Research Paper

Software Engineering Principles in Ensuring the Forensic Integrity of Digital Forensics

nbsp;I… Software engineers should identify a methodology that suites the project.... Software engineering works through the incorporation of distinct phases and activities, which focus on the improvement of planning and management of a development project.... This paper "Software Engineering Principles in Ensuring the Forensic Integrity of Digital forensics" discusses a software engineers that have a task of ensuring that software is secure....
20 Pages (5000 words) Research Paper

Emerging Cyber Security Approaches and Technologies

Some of the technological innovations that are contained in this paper include trustworthy spaces, remote agent technology, searchable encryption, and real time forensics.... This paper provides a review of technologies that can be used for purposes of protecting the cyber space, and the various efforts that government organizations have enacted for purposes of supporting the development and implementation of the technologies concerned....
18 Pages (4500 words) Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us