Forensics project - Essay Example

Comments (0) Cite this document
Summary
Digital forensics also encompasses the investigation of computer crimes. Previously, the term was used interchangeably with computer forensics but has…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER91.1% of users find it useful
Forensics project
Read TextPreview

Extract of sample "Forensics project"

Download file to see previous pages Other applications entail investigating whether there was a breach of network within an organization. In the technical aspects of the investigation, digital forensics has several sub-branches that relate to the digital devices that have been in use. They include the network forensics, mobile data computer, and forensics data analysis (Oriyano & Gregg, 2011).
Apart from the provision of direct evidence relating to digital crimes, digital forensics has vast applications in authenticating documents, confirmation of alibis, identification, and determining the intent of the breach in the information. To sum it, all digital forensics entails the preservation, extraction, and analysis of the evidence relating to digital content for appropriate legal actions. The field concerns with apprehending criminals who use digital technology in committing crimes. Some of the crimes committed through digital technology include hacking of emails to retrieve important information, retrieving information from the government agencies and institutions in an illegal manner for personalized use or terrorism (Oriyano & Gregg, 2011). Gone are the days when criminals used excessive force to get what they want. They have shifted to the use of technology in wiring money to their accounts especially from banking institutions without the use of force. Digital forensics is of relevance to these cases and helps in averting such crimes (Marcella & Guillossou, 2012).
In this project, Digital Forensic Evidence Files will be investigated using the Forensic Toolkit that is available within the Lab. The evidence files have been collected from the suspect’s computer. The files for investigation are true images retrieved from the hard drive of the computer (Marcella & Guillossou, 2012). Three files are available for investigation namely, Thumb drive. E01, Mantooth.E0, and Washer.E01. The files under ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Forensics project Essay Example | Topics and Well Written Essays - 1500 words”, n.d.)
Retrieved from https://studentshare.org/information-technology/1647361-forensics-project
(Forensics Project Essay Example | Topics and Well Written Essays - 1500 Words)
https://studentshare.org/information-technology/1647361-forensics-project.
“Forensics Project Essay Example | Topics and Well Written Essays - 1500 Words”, n.d. https://studentshare.org/information-technology/1647361-forensics-project.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Forensics project

Small Scale Digital Device Forensics Lab Project

...?30 January Small Scale Dgital Device Forensics Lab Project The German born American physicist who developed the theory of relativity, Albert Einstein in a famous quote once said “it’s appallingly obvious our technology has exceeded our humanity,” and indeed he predicted the future accordingly as his discoveries had paved the way for the development of science and into elevating mankind into greater heights that he would never had assumed. The advancement of science, research and through the indefatigable efforts of men, we have explored space, harnessed energy from the elements of nature, broken down matter, questioned astronomies, cracked geology, coined astounding hypothesis almost as good as solid ground theories; in light... January...
4 Pages(1000 words)Essay

Computer Forensics

...?Part Computer forensics has always interested me and though I have considered myself close to being an expert in computer science, I must admit I have had to concede that I have learned that one can do many illicit things with a computer; situations that I did not know existed. Yet on the same token the forensic investigators, “the good guys”, can counter these illegal operations with many sophisticated tricks of their own. Sometimes it is not as instantaneous or glamorous as the fancy gadgets they show on CSI NY but they have many tools available to recreate crimes that can eventually hold up in court. But the TV shows have it right in at least one respect. Not only must the computer...
4 Pages(1000 words)Essay

Forensics Research Project 2

...? Forensics Research Project 2 Generally Acceptable Tactics for the Preservation of a Computer and Its Data Computer data prevention can be regarded as an important task in any organization. In general, there are various acceptable tactics to for the preservation of computer and its data. These tactics have been provided hereunder. 1. Developing a thorough plan for the preservation of the concerned data from the inception to the winding up of the corporation. 2. Establishing the level of "trust" while collecting data 3. Planning for future transition of digital data to new secured storage media (Brodkin, 2013). It can be stated that the aforesaid tactics would generally provide broader explanation to various legal aspects relating... to the...
3 Pages(750 words)Research Paper

Forensics Research Project 3

...? Forensics Research Project 3 Process Framework Computer forensics processing method can be regarded as one of the effective and most indispensable approach for the modern organizations which tends to prevent the misapplication of the organizational resources by a certain degree. In relation to this modern technological era, an effective as well as a well-built computer forensic processing technique can enable the organizations to protect organizational resources from various internal and unwanted or external guests. Therefore, the proposed computer forensic processing method will enable to discover and unveil various significant aspects with the...
4 Pages(1000 words)Research Paper

Computer Forensics

...Running Head: Forensic Biology Forensic Biology [Institute’s Forensic Biology Introduction In specific, the paper will discussand analyze one of the significant techniques in forensic biology: Forensic Toxicology. The legend of the pop industry, Michael Jackson, died on June 25, 2009. That was one of biggest shocks to the music industry and he left millions of his fans with tears and his unforgettable memories. Immediately after his death, every one had questions regarding the causes of the death of Michael. This is one of departments, which a forensic scientist is responsible for dealing with. The initial reports regarding the deal of...
5 Pages(1250 words)Research Paper

Forensics

...Forensics Introduction: The scientific evidence that would be considered in this study would be that of Ddeoxyribonucleic Acid or simply DNA testing, or DNA profiling, or fingerprinting. In real terms the presence of DNA clues in a crime location could make all the difference between return of a guilty verdict, or the exoneration of a suspect. Crime fighters and forensic experts make good use of DNA profiling by matching DNA profiles found at the site of crimes with the DNA records stored in the database of law enforcement authorities. Over the years of its useful application for major tests, and successful accomplishment as a major crime detector, DNA has, perhaps through trials and errors, evolved as a...
5 Pages(1250 words)Essay

Computer Forensics

...Computer Forensics Computer Forensics Even though, computers and internet have helped human to bring revolutionary changes in life styles, it is alsocreating worries because of the misuse. In fact cyber crimes are growing day by day everywhere. The antisocial elements are capable of destroying or breaking the highly secure and strong firewalls in order to steal sensitive information from the computers and internet. In short, the security of computers and internet is highly important in the present day computer dominated world. Computer forensics is relatively a new area developed in the world in order to help the computer users and professionals to increase the security of the functioning...
5 Pages(1250 words)Essay

Project 1 Case Analysis (CCJS321) Digital Forensics

...Case Study Case Study The introduction of technology in lawsuit has made it easy for security agencies to devise ways of curbing criminal activities in their regions. It is essential to note that different departments have embraced technology in their working areas in different perceptions. This means that different technologies can be used in identifying crime differently (Hsu, 2013). These technologies can be studied differently as per the works of different scholars in the academic fields. The first case study involves the guides for the first respondents using electronic crime scene investigation. The second case study involves the need for the use of computer forensics in general. Case Study 1 The first case study is titled... ...
4 Pages(1000 words)Case Study

Virtual Machine Forensics and Network Forensics

... Virtual Machine Forensics A virtual machine (VM) is a software program for creating different environments with each of the environment simulating its components (both hardware and software). Each of the environments (virtual machine) mimics a real computer system with its operating system and hardware. In digital forensics the user controls each of the virtual machines independently. Network forensics refers to the capture, storage, and analysis of network traffic. It can be used interchangeably with terms such as packet mining, packet forensics, or digital forensics. Regardless, the concept remains the same i.e. recording packet traffic of emails,...
2 Pages(500 words)Article

Computer Forensics

...45 questions, worth 2 points each question worth 10 points In a criminal investigation, the prosecutor is required to provide a copy of all evidence in discovery. In these investigations, what is the minimum number of copies that should be made of each digital media device? ________ TWO 2. True or False: Of the three phases of an investigation: Acquisition, Authentication, and Analysis, Acquisition is the process of retrieving digital evidence and verifying that it is authentic. ________ FALSE 3. “A specialty field in which companies retrieve files that were deleted accidentally or purposefully” is the definition for which of the following terms? ________ a. Private Investigation b. Computer Forensics c. Data...
2 Pages(500 words)Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic Forensics project for FREE!

Contact Us