This website uses cookies to ensure you have the best experience. Learn more

Assignment 1: Computer Forensics Overview

1416 words - 6 pages

Assignment 1: Computer Forensics Overview
CIS 417 Computer Forensics

Computer forensics is the process of investigating and analyzing techniques to gather and preserve information and evidence from a particular computing device in a way it can be presented in a court of law.
The main role of computer analyst is to recover data including photos, files/documents, and e-mails from computer storage devices that were deleted, damaged and otherwise manipulated. The forensics expert’s work on cases involving crimes associated with internet based concerns and the investigations of other potential possibilities on other computer systems that may have been related or involved in the crime to find ...view middle of the document...

The sources of the data found, the data would then be saved and placed as vital and non-vital evidence. The data acquired would then be carefully verified and ensure the chain of custody be followed.
* Timeline Analysis: During the above processes, the start investigation and analysis in your forensics lab, a full timeline with time, date, what was used should be kept.
* Media and Artifact Analysis: In most cases there will be an abundance of information that you will be searching through. String or Byte Search: Here it will consist of tools help in searching very low-level raw images. You realize what you are looking then you can use this method to find it.
* Data Recovery: During data recovery entails recovering data from the file system labeling it, time it was accessed along with the time stamps the programs was last used will be accessed.
* Reporting Results: During the reporting results which is the last step in computer forensics analysis, is reporting the information found which includes, but not limited to depending on what the investigation entails is; describing what actions were performed during the process, determining what other actions may be needed to be performed to potentially find more information, and recommending improvements to policies, guidelines, procedures, tools, and other aspects of the entire process.
There can be major issues computer forensics examiners may face which can be categorized into three wider groups; legal issues, administrative issues, and technical issues.
Some of the issues pertaining to these include;
* Encryption: Encryption prevents access to data unless the analyst has password or encryption key.
* Increased Storage Space: Most storage media have large amount of data stored in it, which for the examiner means they must have computers with equally more processing power in them to be able to analyze the data fast and accurately.
* New Technology: The world of computers is evolving so fast, there is always an introduction to new hardware and software and constant updates and changes of Operating Systems. New hardware and software along with constant changes of operating systems and programs in general make it difficult for a computer forensics person to always be up to date with the latest. Each time there is potentially a new challenge.
* Legal issues: This may distract the findings of the examiner, an example is Trojan Defense. Administrative Issues: Administrative issues may include accepted standards that are guidelines in computer forensic, and another administrative issue is fit to practice which shows that there is no body that checks the competence in this profession.
Provide an overview of how computing devices are used in crimes of today and how these crimes can affect a company's data and information.
An overview of some of the crimes used in cyber technology is:
* Hacking: Hacking is breaking into a computer system, knowingly or unknowingly, to...

Other Essays Like Assignment 1: Computer Forensics Overview

Assignment Information Use Paper

671 words - 3 pages Assignment Information Use Paper The way IT is set up at my job are Internet is set with a (LAN) to (WAN). I have a workstation where I use email exchange, (LAN) server controls activate directory. Now with the LAN server with a activate directory set permission control for user and the system administrator is responsible for the performance and operation. Are Administrator sign me to a computer this is one form of security here. Another

Unit 4 Assignment 1

1197 words - 5 pages  IS4670 Cybercrime Forensics Unit 4 Assignment 1 Identify Chain of Custody Roles and Requirements Chain Of Custody What is chain of custody? Chain of custody is the documentation that identifies the changes in the control, handling, possession, ownership, or custody of a piece of evidence. It’s very important to maintain a chain of custody for evidence especially computer evidence. You must be able to keep track of

Is415 Wk 4 Lab

644 words - 3 pages connections such as Telnet and FTP * Compare unencrypted service connections to encrypted communications such as SSH * Identify critical fields within the IP, UDP and TCP packet headers * Distinguish between proper and improper protocol behavior such as TCP 3-way handshake vs. SYN scan Week 4 Lab Part 1 - Assessment Worksheet Overview View the Demo Lab provided in the Practice section of Learning Space Unit 7 and answer the questions

It Industry Careers

2244 words - 9 pages degree. This career overview has four main Bachelor degree programs which are; Database Administration, Computer Programming, Web Designer, and Computer Forensics. Although, these fields offer the skills to work in almost any field of Computer IT Technology, each degree come with more responsibilities related to the field of study. The field of Database Administration coordinates changes to computer database, test and implement the database, applying

Cows Danxing

611 words - 3 pages CSC 441 HUMAN COMPUTER INTERFACE 2014/2015 Academic Session College: Science and Technology Department: Computer and Information Sciences Programmes: * B.Sc. Computer Science * B.Sc. Management Information System Course Code: CSC 441 Course Title: Human Computer Interface Units: 2 Course Lecturers: Dr. (Mrs) Afolabi and Mr Emebo Semester: Omega a. Brief Overview of Course This course is concerned with the design, evaluation and

Project 2 - Ccjs 321 Digital Forensics

1810 words - 8 pages Project 2 CCJS 321 – Digital Forensics | Name Date of submission: FEB 14, 2016 | Project 2 - CCJS 321 Digital Forensics For the purpose of this Project, you are still the InfoSec Specialist for the Makestuff Company. Consider this project a continuation of the work you performed in Project 1. With the scenario in mind, thoroughly answer the following questions (in paragraph format, properly citing outside research, where

Career as a Web Developer

2410 words - 10 pages Education and Certifications 6 Microsoft Certifications 6 Cisco Certifications 7 CompTIA Certifications 7 Career Selection Survey Summary 7 Educational Background Survey Results 8 Employment Status Survey Results 8 Career Selection Survey Results 9 Computer & Software Related Skills Survey Results 10 Field of Interest Survey Results 10 Computer Experience Survey Results 11 Personality Traits Survey Results 12 Willing to

Business and Management

3253 words - 14 pages communications, Inside trading, Tracing funds and or assets Computer Forensics * Identification, collection and forensic analysis of electronic data from a wide range of electronic sources. * One technique is to identify, acquire, authenticate, analyse, document and produce information from electronic resources which may be used in court (eg data warehouse). Sources of data may be email servers, file servers, backup tapes/devices, desktop and

Introduction to Management

4842 words - 20 pages -up blocker in Google Chrome https://productforums.google.com/forum/#!topic/chrome/m-WfaAOYRyA Elearn_SM_15122014_V3.0 4 1.3 Clearing Cache How to clear cache in your computer? 1. Log-out of the LMS and quit the browser. 2. Clear cache. 3. Re-start the browser and login again to submit assignment If you are using Mozilla Firefox, please follow the steps below: 1. 2. 3. 4. Click the menu button and choose Options

C++ Programming

1168 words - 5 pages C++ Programming NOTES ON C++ PROGRAMMING Module 1: Pointers and Memory Management NOTES ON C++ PROGRAMMING Module 1: Pointers and Memory Management TABLE OF CONTENTS TABLE OF CONTENTS 1 OVERVIEW 4 BASIC MEMORY MANAGEMENT 5 GROUP ASSIGNMENT 6 INITIALIZATION 8 CONSTANTS 9 INCREMENT AND DECREMENT OPERATORS 10 ELSE-IF 13 SWITCH 14 LOOPS 15 EXAMPLES OF LOOPS 16 BREAK, CONTINUE 18 RETURN 19 FUNCTION

Information Security In Business Organizations

3793 words - 16 pages to physical facilities does not require a natural catastrophe.1.2 Security ThreatsWhen a person gain unauthorized access to the company's information resources, that person becomes a computer criminal. When computer criminals are employees of the company's competitors, they are called industrial spies. Mcleod (1998) believed that there are four types of threats in information systems.(1). Unauthorized disclosure and theft. When the database and

Related Papers

Executive Summary On Computer Forensics Suites

523 words - 3 pages  Unit 10 Assignment 1: Executive Summary on Computer Forensics Suites IS 3350 Computer forensics is a relatively new scientific process for examining data stored on, received, or transmitted by electronic devices. The data from these electronic devices are examined to find evidence about an event of crime. Computer forensic examiners use specialized software and tools to collect and study data stored on various electronic

Professional Forensics Basics Essay

1056 words - 5 pages Running Head: Professional Forensics Basics Assignment 1: Professional Forensics Basics CIS562 Communication Technology Martha Akalu Introduction: This paper will discuss how a proficient practice of computer forensics aid in todays networked organization. In today’s digital era where computer is the major integral of our daily life, securing our information systems and networks devices from emerging threats has been challenging

Cyber Forensics Essay

4043 words - 17 pages innocence. 4. Reliable “Evidence collection and analysis procedures must not cast doubt on the evidence’s authenticity and veracity” (Vacca, 2005) 5. Believable Evidence presented must be able to interpret clearly and gain the trust of a jury in the court With these rules, it can assure successful evidence collection. Key principles of Cyber Forensics There are four key principles in Cyber Forensics. 1. Standardization â

Ccsi 460 Lab 1 Essay

2118 words - 9 pages Program, Implementation, Casework, Staff Augmentation, Data Mapping, Security Assessment. 4:57pm- Training – Training overview, Course offerings, Certification Programs, Annual Training Passport, On-Site Training. 5:09pm- Resources – Webinars and Demos, Whitepapers and Briefs, Real eDiscovery Mag and EnCase Legal Journal. 5:18pm – Guidance – About Us, Newsroom, Careers, Investors, Contact Us 5:40pm – Home -Gives an overview for Computer Forensics