Sunday, October 6, 2019
Forensic Computing Case Study Example | Topics and Well Written Essays - 2000 words
Forensic Computing - Case Study Example This involves data recoveries, retrievals, analysis, and tracing and decrypting of all the data that has been used in any deceitful activity. The word forensic is used in the context of legal argumentation. Forensic computing is also termed as digital forensics and cyber forensics. It is a branch of forensics related to computer and other digital media. It involves collection, preservation and analysis of the data available on the computer. The definition presented by Computer Forensic world: the field primarily involves ââ¬Å"use of analytical and investigative techniques to identify, collect, examine, and preserve evidence /information which is magnetically stored or encodedâ⬠(1). In other words, forensic computing deals with retrieval of data, and events reconstruction that was performed over the digital media. The scope of forensic investigation involves audio examinations, signal interpretation, repairing the damaged media. Photogrammetry is another aspect of digital fore nsic tracking that includes measuring and monitoring the physical measures of an image by making use of geometric formulae and then making a comparison based on on-site observations. Several factors come as constraints along with computer forensics and the first being the costs since all the equipment used in these processes is high tech and state of the art, large investments are inducted into it. The second hurdle that could be faced by the forensic body is the approval and acceptance of all the proofs by the court. They must prove it to the court that no information is altered and all the legal responsibilities have been fulfilled while conducting the operations. The staff inducted in digital forensic must be knowledgeable and should be able to think about many possibilities and should have knowledge beyond the books. Potential clues and areas that the forensic team would target DNA samples Voice samples Any image used in the process The network used for performing the task ( usu ally in case of credit card and bank accounts forgery) Fingerprints on the electronic equipments Answering machines recordings Miscellaneous electronic equipment Introduction: The aim of forensic computing is to make online activities secure, stop illegal activities that are going on, identify and apprehend the guilty, avoid financial and personal damages to individuals and organizations that might be incurred by the online use. Standard procedures must be followed and all the evidence brought in front of the court must be in a formal pattern that can stand as evidence. In case of actions, warrants are obtained from the authorities for the areas and houses that are suspected of any wrongdoings. A giant step in the direction of forensic computing was taken in 1984 when the F.B.I Magnetic Media Program was created which was later converted into Computer Analysis and Response Team (C.A.R.T). F.B.I report for the year 2003 reported a total of $900,000 netted through computer crime (2). By 2003 F.B.I (C.A.R.T) were looking into 783 terabytes of data as a case of forensic evidence and cases handling. In 1997 G8 ordered training of individuals for looking into matters related to online counterfeit activities .C.A.R.T provides assistance to F.B.I in tracking e-evidence and accessing the accounts and provides other technical support needed by F.B.I in conducting forensic activities. Part of C.A.R.T job is to monitor live activities that are going online. Their task is to provide monitoring in business environment including the banks and government-owned organizations, insurance companies, personal accounts that contain the peopleââ¬â¢s private life and their safety concerned, corporate level that includes the annual reports, facts and data and institutes of any region whose data can be misused by any fraudulent activities performed online.à à Ã
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.