Nobody downloaded yet

Digital Evidence: Understanding The Process and Challenges - Assignment Example

Comments (0) Cite this document
This assignment describes Digital Evidence: Understanding the Process and Challenges. This paper outlines computer forensics, the lifecycle of computer crimes, digital information, juridical and legal issues, problems and safety. …
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER93.1% of users find it useful
Digital Evidence: Understanding The Process and Challenges
Read TextPreview

Extract of sample "Digital Evidence: Understanding The Process and Challenges"

Download file to see previous pages The rapid increase in cyber crimes is posing serious problems for criminal investigators and law enforcement personnel (Sahu, 2008, p.86). In a computer-assisted crime, the evidence is stored in computers or digital media. This paper deals with the processes and challenges involved in identifying, recovering, securing, examining, analyzing and preparing digital evidence from a crime scene.
Computer Forensics is a comparatively new branch of the crime investigational system and involves collecting digital evidence from the crime scene by the analysis of the computers systems, networks, and servers in addition to numerous other digital devices (Sahu, 2008, p.86).
Evidence in any form can be defined as “proof or probative matter that is legally presented at the trial of an issue, by the act of the parties and through the medium of witnesses, records, documents, and objects. From a computer-related crime scene, both physical and digital evidence can be collected. Physical evidence is the computers and its peripherals while digital evidence is the visuals on a monitor, the materials printed using a printer and any other form of digital storage medium (Tipton & Krause, 2007, p.2786).
There are 3 steps in this model. They are Acquire, Authenticate and Analyze. The acquire phase is the methods through which the evidence is collected from the original without any alterations and includes steps such as
The authenticate phase is verifying whether the original and the acquired evidence is the same and the analysis phase the data collected is analyzed without causing any alterations to it (Mc Combie & Warren, 2003, pp.1-2).
The model also includes certain rules. Mckemmish feels that the original digital evidence should be handled minimally and any change in the original should be accounted for. Also, the examiner should understand his knowledge limitations and should comply with the rules of the evidence (Mc Combie & Warren, 2003, p.2).  ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
(Digital Evidence: Understanding The Process and Challenges Assignment, n.d.)
Digital Evidence: Understanding The Process and Challenges Assignment. Retrieved from
(Digital Evidence: Understanding The Process and Challenges Assignment)
Digital Evidence: Understanding The Process and Challenges Assignment.
“Digital Evidence: Understanding The Process and Challenges Assignment”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Digital Evidence: Understanding The Process and Challenges

Digital Evidence & Legal Issues

...files; and the establishment of standard operating processes to effectively protect this unique form of evidence from loss or modification. Otherwise, digital evidence is the surest way to deal with cyber crimes in the modern world of rich technology growth and innovativeness of the criminals. References Casey, E. (2011). Digital Evidence and Computer Crime: Forensic Science, Computers, and the Internet. New York: Academic Press. Daniel, L., & Daniel, L. (2012). Digital Forensics for Legal Professionals: Understanding Digital Evidence From the Warrant to the Courtroom....
5 Pages(1250 words)Research Paper

Computer/Digital Forensics into a presentable and layman terminology and bring it to their understanding at the same time ensuring that the data may not get changed or tempered in any intended or unintended manner. Obstacles faced are not just in the technical domain, rather the legal and evidence protection are two other areas which need to be looked into in order to make the field of forensic science and computing more effective . Apart from the methodical approach and the processes that may be taken, the paper suggests possible solutions towards the reduction of the chances of cyber offenses, these have been provided in form of double option strategy, the first one is creating of a centralized organization...
10 Pages(2500 words)Book Report/Review

Cybercrime and Digital Evidence Computer Forensic Analysis: Cybercrime and Digital Evidence The computer forensic analysis is a computer science field that deals with investigation of computer related acts. Notably, analysis of the digital evidences in line with legal admissibility requires proper investigation; therefore, there are need for proper legal procedures to be undertaken in recovering data and analyzing them against the preempted criminal actions. However, the current laws that are being applied in the cybercrimes are outdated; thus, proving to be ineffective in curbing the cybercrimes (Maras 94). Therefore, the inability of laws to keep the pace with advancement in computer technology...
3 Pages(750 words)Assignment

Understanding consumer decision process

...UNDERSTANDING CONSUMER DECISION PROCESS In the market situation, interacting factors determines the movement of products and services. One important factor in the conceptualization and production of products and commodities is the target market. The consumers mainly comprise the target market of goods and products produced in the market, thus, factors that affect their decision process with regards to the purchase of different products and services in the market is studied. The consumers' reaction to products offered commands the possible success of certain products. Consumers utilize goods and services on a daily basis. In the present era wherein every product that a consumer can...
16 Pages(4000 words)Essay

Digital Forensics/Electronic Evidence

...guilty (Daniel, 2012). Investigators involved in collecting evidence of digital nature ought to have permission to undertake the investigation process. Computers are considered personal therefore; the right procedure should be followed in order to retrieve any form of evidence. In addition, the investigators need to be conversant with computer and electronic operations this will ensure the criminals do not outshine them (Johnson, 2006). Policies with regard to digital evidence should be adhered to prevent interference with the evidence. Digital evidence also recommends that honesty and...
1 Pages(250 words)Essay

Organizations digital investigation process

...Organization’s digital investigation processDigital investigation is the process of preserving, collecting, validating, identifying, analyzing, interpreting, documenting, and presenting of digital evidence from digital sources. The evidence may be used to facilitate the construction of events deemed to be criminal or in contrast with the laid down procedures. Digital investigations for an organization differ to digital investigation for law enforcement because of the procedure adopted. Different models of operation used depend on the complexity of the situation...
5 Pages(1250 words)Essay

Challenges Faced by Cyber Forensic Experts in Search of Digital Evidence

...organisations embrace specialty cybercrime departments to trail cyber fraudsters, stalkers, terrorists, hackers and pornographers. The organisations install cyber forensic professionals to compile proof over the internet and by probing computer hard drives apprehended through police raids. This paper aims at examining cyber forensics, by looking at the process and its applicability in the contemporary society. The paper also highlights the main challenges faced by cyber forensic experts in search of digital evidence. Audience and Scope This paper is suitable for security experts and managers in charge of development, deployment, as well as improvement of cyber...
18 Pages(4500 words)Research Paper

Understanding the New Digital Economy

...Understanding the New Digital Economy Table of Contents Introduction 3 Section 4 Literature Review 4 Section 2: Aspects based on the Provided Arguments 8 Transformation within the Business Process Due To the Impact of Digital Economy 8 Section 3: Negative Aspects of Digital Economy Concept 11 Negative Impact on the Financial and Manufacturing Sectors 11 Section 4: Future Aspects of Digital Economy 14 Potential Impact of Digital Economy on Various Socio-Economic Domains 14 Conclusion 17 18 References 19 Introduction Over the past few years, digital technology has completely reshaped the face of the economy of every single nation mapped on the globe. The growing impact of digitalisation over the traditional sectors have led... the demand for...
18 Pages(4500 words)Essay

Law of Digital Evidence

...Questions on search warrants for computers Given the nature of digital evidence, officers who execute any search warrant for computer devices can turn the search into a “general warrant”. Is this a valid concern?  The argument is valid due to the comprehensive nature of computers as related to other properties. The unequivocal nature of information stored in computers as compared to other properties promoted the increases of concern on the determination of their warrants. Computers have an increased level of personal data. Additionally, the control of such information, as stored in these devices, remains unwarranted by the user. It would not be argued that all the information established from a personal...
2 Pages(500 words)Essay

Law of digital evidence

...Law of digital evidence General warrant Searching a suspect’s private belonging is illegal under the Fourth Amendment. Such arbitrary searches are gross violation of privacy thus basic human rights. Computers constitute private property that law enforcers can never search arbitrarily without approval from a judge. Law enforcers such as the police must always obtain court orders, also known as search warrants in order to search private belonging key among which are computers. Search warranties must indicate the type of searches they approve (Marshall & Baillie 5). Computer searches vary from general searches a fact that makes turning a computer search warrant into a general search. In case they do so,...
1 Pages(250 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Assignment on topic Digital Evidence: Understanding The Process and Challenges for FREE!

Contact Us