Pages

Friday, 23 September 2016

Understanding The Basics Of Computer Forensics

----------------------------------------------
------------------------------------------------------------------

By Shirley Hayes


The adoption of various kinds of computers in personal, corporate, and government processes is leading to a new form of crime referred to as cybercrime. Cybercrime is any kind of crime facilitated by computers. Cybercrime is growing at a very fast rate, something that is making it necessary to formulate strategies for combating this new threat. In a bid to combat cybercrime, a new field of study known as computer forensics (CF) has emerged worldwide.

Computer forensic science is the other name that is used to refer to this field. This science makes one of several other subfields that comprised in digital forensic science. In Albemarle, NC, there are several professionals whose area of expertise is CF. CF is a separate field of study that specializes in the analysis, reporting, and collection of data stored on digital media. The entire profession revolves around computers and digital storage media. Experts prevent and detect criminal activities by using data kept on digital media.

Computer forensic science continues to find more use in new professions. Almost every profession finds CF useful in one way or another. Law enforcement agencies are some examples of bodies that pioneered this field. These agencies make heavy use of this field in various operations. They also stand at the forefront in the major breakthroughs that have been made in CF.

Modern computers are increasingly becoming active crime scenes through the action of criminals and law enforcement officers. A computing device can become a crime scene when it was the target of a denial of service or hacking attack. Computers are also important sources of information in criminal investigations. It may hold information about internet history, emails, and documents, which can be useful in a crime such as a murder.

CF goes beyond finding documents, files, and documents on a computing device. An examination always exploits metadata to find several other pieces of information that can be very helpful in an investigation of crime. For instance, the examination will often reveal the date a document first appeared on a computing device. The examination also identifies when the document was last edited, last saved, and last printed. The user who carried out all these functions can also be identified.

More recently, the employment of CF by commercial organizations has been for organizational benefit. There are several different cases in which CF is employed by commercial organizations. These cases include forgeries, industrial espionage, employment disputes, fraud investigations, and intellectual property theft. Internet use in work-places, inappropriate emails in workplaces, regulatory compliance, and bankruptcy investigations are additional cases handled under this field.

Investigators in this field employ a wide range of techniques in their investigations. Some of these techniques include cross-drive analysis, live analysis, deleted files, stochastic forensics, and steganography. Cross-drive analysis is a technique that correlates information derived from several hard drives.

CF examination is a single process that is comprised of six separate steps. These steps include readiness, presentation, review, collection, evaluation, and analysis. The list above is not in a chronological order. Although very crucial, the readiness step is often overlooked. Legal, administrative, and technical are the three broad categories of issues that prevail in this field.




About the Author:



No comments:

Post a Comment