StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

The Computer Forensics Processing Method - Research Paper Example

Cite this document
Summary
The paper "The Computer Forensics Processing Method" states that the steps that are required to defend interests significantly involve adopting adequate measures for improving technological infrastructures and apparently identifying the illegal activities performed within the organization…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92% of users find it useful
The Computer Forensics Processing Method
Read Text Preview

Extract of sample "The Computer Forensics Processing Method"

? Forensics Research Project 3 Process Framework Computer forensics processing method can be regarded as one of the effective and most indispensable approach for the modern organizations which tends to prevent the misapplication of the organizational resources by a certain degree. In relation to this modern technological era, an effective as well as a well-built computer forensic processing technique can enable the organizations to protect organizational resources from various internal and unwanted or external guests. Therefore, the proposed computer forensic processing method will enable to discover and unveil various significant aspects with the intention of protecting any unauthorized access or misuse of organizational resources within an organization. The primary purpose of the computer forensic processing method would emphasize certain major factors namely image copying technology, defining principles underneath computer forensic method, formalizing most appropriate methodology in order to assemble as well as to examine the activities of the users and presenting alleged data or information to a court law. With this regard, the framework of this computer forensic method will mainly comply with four major processes that comprise acquisition, identification, evaluation and presentation (Craiger, n.d.). In relation to the provided case, it can be apparently observed that organizational resources have been misused by the staffs during the work schedule in terms of using computers, network and cell phones particularly for electronic gambling. This particular practice can unfavorably impact the overall performance of the organization through various ways. For instance, the misuse of such type of organizational resources can severely impact on the organization’s performance and reduce its competencies to achieve the ultimate goals and objectives. Moreover, the practice can also negatively effect on time, cost as well as performance of each individual attached with the organization. Steps Required to Investigate, Document and Preserve Evidence The computer forensic process with respect to the provided case scenario will be focused on conservation, recognition along with extraction of computer media with the intention of protecting the organizational resources and intellectual property. In this regard, the major functions and the implications of different steps that can be involved within the computer forensic processing method have been demonstrated in the following discussion. Step1: Acquisition The acquisition step of the proposed computer forensic processing method can be referred to assess or to keep the track of each computer system within an organization. The process significantly helps to preserve detail evidence of the users concerning their conduct of different activities in the organization (Organization of American States, 2011). In relation to the provided case scenario, the acquisition step within the forensic method will be focused on keeping the track of uninvited or unauthorized individuals through developing any technological system within the organization. The process would enable the administrators to track and assess the activities performed by the users through allocated systems. Moreover, the step will also involve the process of preserving data or information concerning the movement of each user through their systems and enable the administrators to prepare effective documentation regarding the misuse or fraud related activities performed by the employees. Additionally, the step would also facilitate to efficiently maintain effective information flow and help the organization to protect its resources and intellectual property by a certain degree. Step2: Identification The identification step is generally defined as the process of analyzing various sorts of technological aspects that include physical and logical units of the systems that are executed in an organization. The step also involves presentation of different opinion in accordance with the relevance of the findings. Moreover, handling and labeling of different activities performed by the users can be duly considered playing a decisive part in the identification step relating to any computer forensic processing method. The step would help the administrators to efficiently recognize the fraud or illegal activities performed by the users and enable the organizations to document the evidences that need to be submitted for the conduct of forensic tests (Organization of American States, 2011). In this regard, the identification step in the proposed computer forensic processing method would certainly enable the administrators to monitor and also to identify data or transactions made by each user within the organization. Moreover, it will also facilitate to extract and to recover any sort of obliterate data or transactions made by the employees. In this regard, the process would help the organization to monitor the fraudulent acts along with other gambling activities perform by the employees during the working hours. Step3: Evaluation The evaluation step within the computer forensic process comprises assessing data or information that has been recovered from the identification step. In this process, the fraudulent activities or any misuse of the organizational resources which can lead to destruction of the intellectual property are evaluated. The activities performed within the evaluation step might enable the organization to recognize strengthening its security measures to protect from the conduct of different malpractices or the fraudulent acts that perform by the employees within the organization (Organization of American States, 2011). In the context of the provided case scenario, the evaluation of the recovered data or information would enable the administrator to unveil the conduct of fraud activities or misuse of organizational resources which could lead to adversely effect upon its intellectual property by a greater level. Step4: Presentation The presentation step within the computer forensic process incorporates the presentation of discovered evidences regarding the malpractices and any other act that might lead towards adversely affecting the organization’s intellectual property. With reference to the provided case scenario, the presentation process of the evidences would be managed in an apparent and understandable manner so as to easily recognize by the legal members and other associated individuals of the organization. The process further enables the organization to sue against the offender as per determined by the stipulated law (US Department of Justice, 2004). With reference to the aforesaid steps involved within the computer forensic procedure, it can be viewed that the phases are highly beneficial for an investigator to protect the misuse of organizational resources along with defending intellectual property. Therefore, as an investigator, the steps that are required to defend interests significantly involve adopting adequate measures for improving technological infrastructures and apparently identifying the illegal activities performed within the organization. References Craiger, J. P. (n.d.). Computer forensics procedures and methods. Retrieved from http://www.ncfs.ucf.edu/craiger.forensics.methods.procedures.final.pdf Organization of American States. (2011). Best practices for computer forensics. Retrieved from http://www.oas.org/juridico/spanish/cyb_best_pract.pdf US Department of Justice. (2004). Forensic examination of digital evidence: A guide for law enforcement. Retrieved from https://www.ncjrs.gov/pdffiles1/nij/199408.pdf Read More
Tags
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Forensics Research Project 3 Paper Example | Topics and Well Written Essays - 1000 words”, n.d.)
Forensics Research Project 3 Paper Example | Topics and Well Written Essays - 1000 words. Retrieved from https://studentshare.org/information-technology/1483947-forensics-research-project
(Forensics Research Project 3 Paper Example | Topics and Well Written Essays - 1000 Words)
Forensics Research Project 3 Paper Example | Topics and Well Written Essays - 1000 Words. https://studentshare.org/information-technology/1483947-forensics-research-project.
“Forensics Research Project 3 Paper Example | Topics and Well Written Essays - 1000 Words”, n.d. https://studentshare.org/information-technology/1483947-forensics-research-project.
  • Cited: 0 times

CHECK THESE SAMPLES OF The Computer Forensics Processing Method

Forensic Evidence

Discussing computer forensics in the context of law enforcement agencies or in corporate security, it will lead to a conclusion of a subject that covers the utilization of computers to catalog physical evidence.... Introduction Discussing computer forensics in the context of law enforcement agencies or in corporate security, it will lead to a conclusion of a subject that covers the utilization of computers to catalog physical evidence that is analyzed in other forensics techniques including biometric identification, analyzing DNA and dental evidence....
5 Pages (1250 words) Research Paper

Current Developments in Forensic Computing

The emergence of computer crimes which is highly technical in nature has led to the creation of a new branch of forensic science known as computer forensics derived from the practice of forensic medicine ( Berghel, 2003; Gladyshev, 2004).... The following part of this paper presents the definition of computer forensics than the currents developments in this field and finally the effects of various factors like economic, social, political, and cultural factors on computer forensics....
7 Pages (1750 words) Report

New York Computer Forensics

In addition, experience in a variety of investigation scenarios over the years has permitted and skilled New York Computer Forensic Services to build up procedures and started measures that make results matchless in the computer forensics field (Global Digital Forensics, 2012).... This report 'New York computer forensics' presents an overview of companies specializing in computer forensics software or services.... The author states that computer forensics can be defined in many ways....
3 Pages (750 words) Essay

The Challenges of the Forensic Recovery and Examination of Data from Mobile Devices

The software programs used for mobile forensics are in most cases are not fully capable of retrieving and processing data.... Due to their size and portability mobile devices have become the vessels of storing, processing, and transmitting the information.... This research proposal "The Challenges of the Forensic Recovery and Examination of Data from Mobile Devices" discusses mobile device forensics as a dynamic field.... The involvement of these devices in criminal activities calls for mobile device forensics and data recovery....
14 Pages (3500 words) Research Proposal

Computer Forensics: Admissibility of Evidence

This essay "computer forensics: Admissibility of Evidence" examines the searching of personal gadgets and the use of DNA databases that has opened new avenues for investigators.... In recent years the use of computer forensics has been crucial in proving the guilt or innocence of accused criminals.... However, with the prevalence of technology in our everyday lives, computer forensics is an obvious by-product.... Whitcomb in his article, 'The Evolution of Digital Evidence in Forensic Science Laboratories,' describes how computer forensics has grown over the last four decades....
6 Pages (1500 words) Admission/Application Essay

The Difference between Forensic and Security Evidence

The user data can be extracted from personal storage devices like computer hard disk, flash drive, memory cards, etc (computer forensics – a critical need in a computer, n.... For instance, during the execution of a search warrant of serial killer John Robinson at the residence, law enforcement agencies seize five computers along with badly decomposed two dead bodies (computer forensics, n.... These facts cannot be gathered with physical evidence techniques and evidence and without computer forensic techniques (computer forensics, n....
6 Pages (1500 words) Literature review

Independent Expert Witness Use of Computer Forensic

The paper "Independent Expert Witness Use of Computer Forensic" highlights that generally, now many educational institutions are offering computer forensics degrees, and related education has become a minimum requirement to stay competitive in the industry.... computer forensics consulting firms or freelance computer forensic investigators are also hired by large corporations to test the information systems security they have in place.... This has created an increased need for individuals educated in computer forensics or computer forensic investigators....
10 Pages (2500 words) Coursework

Software Engineering Principles in Ensuring the Forensic Integrity of Digital Forensics

This paper "Software Engineering Principles in Ensuring the Forensic Integrity of Digital forensics" discusses a software engineers that have a task of ensuring that software is secure.... In order to develop secure software that ensures the forensic integrity of digital forensics, it is essential for developers to incorporate systematic approaches that support security methodologies.... In the context of digital forensics, software is used to create and certify an image of a suspect....
20 Pages (5000 words) Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us