StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

The Latest from Computer Forensics - Essay Example

Cite this document
Summary
The essay "The Latest from Computer Forensics" focuses on the critical analysis and discussion by enumerating applicable laws and notable contributions of computer forensics. With the rise of Internet usage in this Information Age, there corresponded a proportional increase in its misuse…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.3% of users find it useful
The Latest from Computer Forensics
Read Text Preview

Extract of sample "The Latest from Computer Forensics"

Download file to see previous pages

Banks get robbed, and even some personnel were killed. Some rich or well-to-do people found themselves abducted for ransom. But today, theft is more insidious and even subtle. One may not realize that he or she has been a victim already.

When the Internet got into the hands of many people and that life has become intertwined with it, more and more people have become susceptible to crimes committed via the Internet, usually termed cybercrime. This paper shall survey the emerging technologies that are being used against cybercrime. In particular, we shall take a look at the developments happening in the field of computer forensics and how law-enforcement agencies are capitalizing on these. But for a start, let us examine what cybercrimes are.

Etymologically speaking, cybercrimes are crimes committed via the world-wide-web. Although no rigorous definition of it has been formulated, we can accept the common sense definition is useful. Examples of cybercrimes are “gaining unauthorized access to computer files, disrupting the operation of remote computers with viruses, worms, logic bombs, Trojan horses, and denial of service attacks; distributing and creating child pornography, stealing another's identity; selling contraband, and stalking victims” (Nesson, 2001).

Almost everyone knows about the damages inflicted by Melissa and ILOVEYOU viruses. Once in a while, a news report features the arrest of a hacker or a perpetrator of identity theft. These are not just petty crimes; they struck damage to our economy. The FBI reports an annual loss of about $ 67 Billion due to such acts (Cybercrime, 2007).

With these in mind, there must be found a way to prevent these crimes. If not, perhaps prosecution of the criminal will suffice. We should look to our law-enforcing agencies for their use of Computer Forensics. Computer Forensics is similar to the regular forensics procedures done by law enforcers, such as those seen in CSI.

Computer forensics is “a detailed and scientific study, research and implementation of computer science subjects to gather digital evidence in cases of cyber crimes or for other scientific research purposes”. In computer networks, experts use packet sniffing, IP address tracing and email address tracing (Vyavhare, 2007).

Packet sniffing is the retrieval of crucial data packets from networks. These may contain usernames or passwords used by cybercriminals.

IP addresses are unique, but sometimes criminals use proxies. The goal of IP address tracing is to trace the real IP address of the culprit.

Email tracking is used when the cybercriminal may be still in the location where a questionable email has been sent. If not, tracing the email, may provide valuable clues.

In computer systems, the computer forensics expert analyzes the file structure, checks the storage media, uses steganography (the art of concealing information in images, sounds, or any unconventional file format), and scrutinizes print-outs (Vyavhare, 2007).

File structures must be scrutinized. Upon an incident involving a cybercrime, certain files may be generated. These could contain information such as username or password. Or, perhaps these could contain other clues.

 Storage media are analyzed because even if the culprits had deleted the questionable and incriminating files, with the help of technology, these could be recovered. Although they may not be recovered fully, those fragments may be of some help.

Sometimes, culprits hide incriminating information in the least suspected places. This has made the study of steganography mandatory for computer forensics experts.

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Computer Forensics Essay Example | Topics and Well Written Essays - 2250 words”, n.d.)
Retrieved from https://studentshare.org/miscellaneous/1517953-computer-forensics
(Computer Forensics Essay Example | Topics and Well Written Essays - 2250 Words)
https://studentshare.org/miscellaneous/1517953-computer-forensics.
“Computer Forensics Essay Example | Topics and Well Written Essays - 2250 Words”, n.d. https://studentshare.org/miscellaneous/1517953-computer-forensics.
  • Cited: 0 times

CHECK THESE SAMPLES OF The Latest from Computer Forensics

Forensic Computing

Several factors come as constraints along with computer forensics and the first being the costs since all the equipment used in these processes is high tech and state of the art, large investments are inducted into it.... This paper "Forensic Computing" focuses on the fact that the end of the 20th century saw a massive advancement in the field of forensics pertaining to electronic use.... Admissibility is the fact that no rules have been violated as per privacy of the common citizen and all the procedures adopted are in accordance with the laws defined by the governing body of digital forensics....
8 Pages (2000 words) Case Study

Computer Forensic Tools

the latest model of Flasher Box cost approximately $10000.... computer Forensic Tools Name Number Course Tutor Date There is different software that can be used to recover deleted files in a computer system.... It works by scanning the hard drive and creating an index both existing and deleted files and directory on the logical drive of the computer.... In addition, one requires a personal computer such as a laptop to use the device....
3 Pages (750 words) Term Paper

Computer Forensic Software

Several subjects that include evidence imaging, e-mail investigations, data recovery, analysis of file structures, hidden and deleted file recovery, password recovery, and decryption of encrypted data in addition to forensics visualization, which is important in reducing the amount of time required in inspecting as well as analyzing vast amounts of data.... The paper "computer Forensic Software" discusses that good visualizations and visual interfaces can be essential in reducing the time required to analyze data....
15 Pages (3750 words) Coursework

The Development of DNA Fingerprinting and Computer Forensics

This paper under the headline "The Development of DNA Fingerprinting and computer forensics" focuses on the fact that forensic scientists use all the tools and technologies at their disposal to gather and analyze the evidence from criminal investigations.... The question of civil liberties violations is long-standing, and both DNA profiling and computer forensics occupy a decidedly fuzzy area of investigation and require the utmost of care when scientists are gathering evidence....
9 Pages (2250 words) Assignment

Independent Expert Witness Use of Computer Forensic

The paper "Independent Expert Witness Use of Computer Forensic" highlights that generally, now many educational institutions are offering computer forensics degrees, and related education has become a minimum requirement to stay competitive in the industry.... computer forensics consulting firms or freelance computer forensic investigators are also hired by large corporations to test the information systems security they have in place.... This has created an increased need for individuals educated in computer forensics or computer forensic investigators....
10 Pages (2500 words) Coursework

Peculiarities of Digital Forensic

This paper demonstrates the importance of computer forensics, the process involved with it, data collection, admissibility of digital forensic evidence and detection of hidden data.... Since computer forensics is a fresh discipline, there is less consistency and reliability across the courts and industry.... computer forensics may be defined as the discipline that merges fundamentals of law and computer science to gather and study data from computer systems, networks, wireless communications, and storage devices in such a way that is acceptable as proof in a court of law....
10 Pages (2500 words) Coursework

Computer Forensic Tools Test Method

Note the inroads of forensic from the centuries-old application to the advent of scientific-based correlation of computer forensics.... As the paper "Computer Forensic Tools Test Method" outlines, the Control Process on the methods of testing conducted for Computer Forensic Tools is extremely important in ensuring that justice grinds to its foolproof efficacy through the aid of modern forensics.... The need to magnify the tools employed in the testing and methodology for computer forensic comes to afore....
1 Pages (250 words) Essay

The Key Principles of Cyber Forensics

Cyber forensics is therefore the process of extracting information and data from computer systems while guaranteeing on its accuracy and reliability, in a manner that is legally acceptable via the application of computer technology to the investigation of computer based crime (US-Cert, 2008).... This particular paper will describe digital evidence, explain on the key principles of cyber forensics while outlining the threats that are held when digital evidence is stored on computers....
17 Pages (4250 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us