Overview of digital forensics at NIST - Article Example

Comments (0) Cite this document
National Institute of Standards and Technology (NIST) is a federal technology agency that mainly works hand in hand with industries to improve the innovations technology and security. Digital forensics is a scientific technique used to provide analyzed information to support…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER94.1% of users find it useful
Overview of digital forensics at NIST
Read TextPreview

Extract of sample "Overview of digital forensics at NIST"

Digital Forensics at NIST National Institute of Standards and Technology (NIST) is a federal technology agency that mainlyworks hand in hand with industries to improve the innovations technology and security. Digital forensics is a scientific technique used to provide analyzed information to support investigations in cases of security incidences, arising from crimes, system damages and even recoveries of lost or damaged data (Shirley, par. 1). The main aim of using these techniques is to provide defined information to help in the investigations, analysis and provide proper recommendations on computer based security incidences. Due to the increased computer related crimes, it is a fundamental requirement for any organization to employ these digital forensic skills to establish and solve their security issues.
Use of these forensic techniques provides an additional assistance to the organization since it helps in troubleshooting, identification and repair of operational issues within a system, reviewing of the operating systems (Barnett, par. 9). Also provides recovery of lost data from computer systems in case of malicious or accidental damage. It provides protection of sensitive information which would otherwise be used for malicious purposes and even acquisition of data from the hosts that can be used by the company in the future. Furthermore, it also gives an opportunity to monitor log entries and prevention of policy violations.
Apart from all the support these digital forensics, there are shortcomings that accompany their use and benefits outlined above. One disadvantage is the difficulty in obtaining information from mobile devices like phones, iPads, and personal digital assistants. Law enforcement and forensics on these devices are still a challenge since most of the mobile devices require specialized interfaces, storage, and hardware. Also getting information from the cloud storage space is tedious because of the complicated cloud technology.

Works cited.
Bennett, David. “The Challenges Facing Computer Forensics in Obtaining Information from Mobile Devices for Use in Criminal Investigations”. Forensic Focus Journal. 20.8 (2011). Web March 28, 2015
<> Shirley, Radack. Forensic techniques: helping organizations improve their responses to information security incidences. Web 28 March 2015. <>Read More
Cite this document
  • APA
  • MLA
(“Overview of digital forensics at NIST Article Example | Topics and Well Written Essays - 250 words”, n.d.)
Overview of digital forensics at NIST Article Example | Topics and Well Written Essays - 250 words. Retrieved from
(Overview of Digital Forensics at NIST Article Example | Topics and Well Written Essays - 250 Words)
Overview of Digital Forensics at NIST Article Example | Topics and Well Written Essays - 250 Words.
“Overview of Digital Forensics at NIST Article Example | Topics and Well Written Essays - 250 Words”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Overview of digital forensics at NIST

Digital Evidence ethics and computer forensics

...?Digital evidence for computer forensics Number Content related crime. Overview Content related crime is computer crime that targets to corrupt the mind of the victim. The most common is child pornography. This is directed at sexually abusing the child. The scenario whereby somebody view, posses or produce and distribute copies of obscene images is a very sensitive thing that is considered a crime. When pornographic materials are found in somebody’s computer, it is considered as a crime and is punishable by law. The perpetrators can be the staff in the companies or even the student. When it comes to ethical issues, somebody or the culprit may want to run away from the issue saying that he...
12 Pages(3000 words)Essay

Small Scale Digital Device Forensics Lab Project

...?30 January Small Scale Dgital Device Forensics Lab Project The German born American physicist who developed the theory of relativity, Albert Einstein in a famous quote once said “it’s appallingly obvious our technology has exceeded our humanity,” and indeed he predicted the future accordingly as his discoveries had paved the way for the development of science and into elevating mankind into greater heights that he would never had assumed. The advancement of science, research and through the indefatigable efforts of men, we have explored space, harnessed energy from the elements of nature, broken down matter, questioned astronomies, cracked geology, coined astounding hypothesis almost as good as solid ground theories; in light... January...
4 Pages(1000 words)Essay

The Digital Forensics

A distributed network can be on a broad scale and may involve many enterprise computer networks. Likewise, the currently installed network security controls are bypassed by the worm because distributed traffic anomaly is complex and small to detect. However, combining with multiple small data packets can impose a significant impact, as they all share the same frequency and domain that is already happening in the current scenario. For this reason, a method for detecting threats originating from the distributed network was introduced by (Zonglin, Guangmin, Xingmiao, & Dan, 2009). The methodology includes a detection of patterns of the distributed network along with network-wide correlation analysis of instantaneous parameters, a...
4 Pages(1000 words)Research Paper

Digital Image Metadata and Exif files - Forensics

..., 2010) Figure 7: Main features of the NuDetective Forensic Tool (Eleuterio & Polastro) References Apple Inc. (2011). Working with location information in places view. In Aperture 3 User Manual Retrieved from Bargmeyer, B. E., & Gillman, D. W. (n.d.). Metadata standards and metadata registries: Overview. Retrieved from Bureau of Labor Statistics website: Eleuterio, P., & Polastro, M. (n.d.). Nudetective: Automatic detection of child and teen pornography at crime scenes. In Brazilian Federal Police (Ed.), Session 14.6 (p. 1). Retrieved from JISC Digital Media. (2009). Introduction... ?...
5 Pages(1250 words)Research Paper

Computer/Digital Forensics

...?Computer/ Digital Forensics: Introduction: It is a fact that computer has become an integral part of our social and private life, but it is the mostvulnerable form of communication and is prone to all kinds of challenges and obstacles. These challenges come in form of security breaches, viruses, Trojans, spam, and many more forms that leave it as the least secure network. The case is further worsened by the fact that there is lack of awareness and sense towards safe operations amongst the common users and the members and the professionals who are designated to make this medium a better and safer one for all kinds of functions of daily life. A vigorous mechanism needs to be devised that can look into all...
10 Pages(2500 words)Book Report/Review

The Increased Need for Digital Forensics

... HERE HERE YOUR HERE HERE The Increased Need for Digital Forensics Contemporary society has created multiple communications systems due to the advent of modern technology. Internet, personal computers, laptop computers, iPods, Blackberry devices, and any other number of technological innovations have changed the method by which society interacts with the broader external community. With these changes, however, come opportunities to commit illegal activities using modern technological devices, in some fashion, to perpetrate crime of multiple varieties. Due to the increased frequency and the changing scope of certain crimes, especially cyber crime, there has been a heightened demand for digital forensic professionals to support law... ...
10 Pages(2500 words)Essay

Digital Forensics

...Running head: Digital forensics The need for digital forensics has risen with the increase in digital crimes. Criminal Prosecutors use evidence from digital forensics in a variety of crimes where one can find incriminating documents involving misappropriation record keeping, financial fraud, homicides, child pornography and drug trafficking among others. This paper involves an assessment study on digital forensics and its focus is on admissibility of electronic evidence. It demonstrates how a system administrator would capture and authenticate log files from a system under her authority...
6 Pages(1500 words)Essay

Digital Forensics/Electronic Evidence

...Digital forensics/ electronic evidence Digital forensic involves the concept of retrieving information from computer media. Advancement in technology has made it possible for digital forensic to develop and investigators have found an easier way to capture computer criminals. Digital forensic ensures accuracy is observed and criminals are brought to justice (Daniel, 2012). The three types of crimes covered under digital forensic include; child pornography which is the most diverse type of digital crime. Child pornography destroys the minds of children and...
1 Pages(250 words)Essay

Legal Topic Digital Forensics Paper

...Digital Forensics Digital Forensics Digital forensics has an indispensable contribution to the investigation and prosecution of cybercrime. There are cybercrime laws that govern the prosecution of the crime. Different elements justify the adequacy of digital forensics investigation. An outline of a case involving digital forensics investigation of child pornography The United States v Lynn of 2008 is a legal case that had a significant digital forensics component. The case followed the search and arrest of Ryan Christopher Lynn who lived in California for the charges of receipt and possession of child pornography videos. Federal agents seized Lynn’s Toshiba Laptop computer and conducted digital forensics investigation... . This is because...
4 Pages(1000 words)Research Paper

Cybercrime Investigation and Digital Forensics

...Cybercrime Investigation and Digital Forensics An Assignment Submitted by Fall Cybercrime Investigation and Digital Forensics Digital identities of people are being threatened by various cyber threats that are becoming more sophisticated day by day. Healthcare sector is not an exemption to this issue. Healthcare industries are transforming due to the increasing advances in technology with maintenance of electronic health records becoming mandatory for improving patient privacy, reducing cost, providing collaborative care, and ensuring high quality of healthcare services (Trobough, 2014). Internet enabled patient monitoring tactics are being introduced by...
7 Pages(1750 words)Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Article on topic Overview of digital forensics at NIST for FREE!

Contact Us