StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Forrensic computing - securing evidence - Essay Example

Cite this document
Summary
The chief information officer (CIO) Mr I. Knowsal has noticed that some records relating to particular orders appear to have been tampered with; amounts of many don’t tally with…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.2% of users find it useful
Forrensic computing - securing evidence
Read Text Preview

Extract of sample "Forrensic computing - securing evidence"

Download file to see previous pages

Archie Rival, who got the job, says he is very happy with Axta’s work and doesn’t feel there is any conflict. However, at a recent annual review meeting the shipping clerk Asif Iwud told his reviewer in confidence that he believed Axta had not ‘forgotten and forgiven but had other fish to fry’. He believes she will be resigning soon and is hoping to get her job. Evidence is the means and materials that enable a case to be proven. The evidence shows the actual events that took place in any situation, and evidence can either be Digital, Electronic or physical.

Digital Evidence is the information that is transmitted or stored in computers in binary form, and which is admissible in a court of law. Electronic Evidence is evidence or data of investigative value which can be stored and transmitted by electronic devices. Various jurisdictions allow for various principles concerning electronic evidence, but these principles are quite similar to the principles defined by the ACPO (Association of Chief Police Officers). 4 principles of digital and electronic evidence are defined in the third version of the Good Practice Guide for Computer Based Evidence, and these will be described here.

Whenever there is cause for computers to be confiscated for forensic examination, there are some pointers as regards the ACPO (Association of Chief Police Officers) Guide for Good Practice concerning digital and electronic evidence. The guidelines are basically for Police Officers in the United Kingdom, but it is good practice to follow these guidelines especially when there is need to seize and examine electronic data. It is also good practice to treat electronic data in the same manner as physical or traditional forensic evidence, and the ACPO guidelines are aimed at achieving the required standards.

Also following these principles will ensure the integrity of the case and, ensure that the steps taken are in compliance with the

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Forrensic computing - securing evidence Essay Example | Topics and Well Written Essays - 1000 words”, n.d.)
Retrieved from https://studentshare.org/miscellaneous/1553700-forrensic-computing-securing-evidence
(Forrensic Computing - Securing Evidence Essay Example | Topics and Well Written Essays - 1000 Words)
https://studentshare.org/miscellaneous/1553700-forrensic-computing-securing-evidence.
“Forrensic Computing - Securing Evidence Essay Example | Topics and Well Written Essays - 1000 Words”, n.d. https://studentshare.org/miscellaneous/1553700-forrensic-computing-securing-evidence.
  • Cited: 0 times

CHECK THESE SAMPLES OF Forrensic computing - securing evidence

The Challenges of the Forensic Recovery and Examination of Data from Mobile Devices

There is no full data recovery due to the quicksilver character nature of electronic evidence in mobile devices.... These devices can be connected to crime if they are: used as a communication tool in the act of crime, means of committing the crime, they contain information and a data warehouse device providing evidence.... Mobile devices forensics can be defined as the science of retrieval of digital evidence from mobile devices and entails methods that show how this evidence is retrieved....
14 Pages (3500 words) Research Proposal

The Evidence of a Cybercrime Incident

The paper will detail the procedure used in discovering and investigating the evidence in this case.... It is used by both federal and local law enforcement agencies in the US for obtaining evidence for criminal cases related to computer crime.... They argue that many criminals are taking advantage of the convenience, speed and anonymity provided by the current modern technologies to commit a wide rage of crime....
5 Pages (1250 words) Research Paper

Role of Computer Forensics and Investigation Report in Criminology

Live data acquisition is a process in which computer forensic experts make a copy of the digital evidence, from a digital device, by running a program (University at Buffalo, n.... By understanding this data storage system, computer forensic experts can collect relevant evidence from computers with high precision....
5 Pages (1250 words) Research Paper

The Difference between Forensic and Security Evidence

The paper "The Difference between Forensic and Security evidence" concluded all mechanisms required for designing protection are included in security while forensic prompt after an accident....    … Computer forensic sets the circumstances to lead the law enforcement agencies and corporate security to subject computers as catalyst for the physical evidence using some forensic techniques which includes analyzing of DNA traces, biometric identification ....
6 Pages (1500 words) Literature review

Computer Forensics Professional Certifications

In regard to a uter forensic, the demand is high especially in the police stations due to the need of understanding computer and related issues in the law enforcement line of work computer forensics involves the analysis and investigation of computing devices for the purpose of using that knowledge to provide witness in a court of law....
5 Pages (1250 words) Research Paper

Acquiring Network Forensic Evidence

The paper "Acquiring Network Forensic evidence" concerns computer forensics in the context of law enforcement agencies or in corporate security, the utilization of computers to catalog physical evidence that is analyzed in forensics techniques including biometric identification, analyzing DNA, etc.... Although, computer forensics also facilitates investigation of crimes within themselves in order to gather evidence associated with criminal activities that breach violation of an organization's policy....
6 Pages (1500 words) Essay

Comparing and Contrasting Android and iOS Forensics

This paper ''Comparing and Contrasting Android and iOS Forensics'' tells that A physical forensic examination is different from a logical one, as applicable to mobile devices like iOS and Android.... The procedure to extract data from mobile phones does not confirm the authentication of such assessment....
5 Pages (1250 words) Report

Corporate Digital Forensic Investigations

When such crimes are committed, law enforcement agencies use digital forensic techniques to gather and collect evidence that is used to identify and prosecute the perpetrators of the crimes.... Digital forensic investigations, therefore, are important in ensuring that evidence is gathered and collected regarding the crime committed on a technological platform.... Cloud computing has emerged as a new approach to delivering information communications technology to companies and other organizations....
6 Pages (1500 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us