Friday 30 September 2016

The Field Of Computer Forensics

By Shirley Hayes


The adoption of various kinds of computers in personal, corporate, and government processes is leading to a new form of crime referred to as cybercrime. Cybercrime is any kind of crime facilitated by computers. Cybercrime is growing at a very fast rate, something that is making it necessary to formulate strategies for combating this new threat. In a bid to combat cybercrime, a new field of study known as computer forensics (CF) has emerged worldwide.

This field also goes by the name computer forensic science. Albemarle, NC, is home to some of the best experts in this field. Computer forensic science is a branch within the field of digital forensic science. As a field of study, it pertains to all evidence gathered from computing devices and digital storage media. Experts in this field aim to collect, analyze, and report on digital data in a way that is legally admissible. They use data that is stored digitally to prevent and detect crime.

In the current way of life, the application of computer forensic science is almost in all professions. The professions in which this science does not apply are countable. Law enforcement agencies are the earliest bodies to have used CF in their operations. These agencies also remain to be the heaviest user of this science, contributing enormously to developments observed in the field.

There are several different scenarios in which computers can be crime scenes. For instance, during a hacking or denial of service attack, the computer in question often becomes the crime scene. Computers can also be sources of useful evidence in the form of internet history, documents, and emails, which may be relevant in crimes such as drug trafficking, kidnapping, and murder.

The scope of CF goes well beyond retrieving emails and files from computers. It involves analyzing metadata to collect more useful information from these documents. Information contained in metadata can be used to know the exact date a file first appeared on a computer. It is also possible to know the last date of access, printing, editing, and saving. The user who carried all the aforementioned activities can also be known through metadata.

More recently, the employment of CF by commercial organizations has been for organizational benefit. There are several different cases in which CF is employed by commercial organizations. These cases include forgeries, industrial espionage, employment disputes, fraud investigations, and intellectual property theft. Internet use in work-places, inappropriate emails in workplaces, regulatory compliance, and bankruptcy investigations are additional cases handled under this field.

Investigation in this field employs several different techniques. These techniques include cross-drive analysis, stochastic forensics, steganography, live analysis, and deleted files. The correlation of information gathered from multiple hard drives is done under cross-drive analysis.

The process of CF examination has been categorized into six main processes. These processes are readiness, evaluation, collection, analysis, presentation, and review. The readiness stage is a very crucial stage, but it is often overlooked by experts in this field. CF, like other fields, is also faced by several issues, which can be categorized as legal, administrative, and technical.




About the Author:



No comments:

Post a Comment