Computer Forensics and Digital Evidence Expository Essay

Exclusively available on Available only on IvyPanda®
This academic paper example has been carefully picked, checked and refined by our editorial team.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment

Conducting investigation of computers does not differ much from traditional public investigation. It also implies search for material evidence, including word documents, photos, pictures, or graphic data. The only difference lies in methods of extracting these computer artifacts (Nelson & Phillips, 2010).

In this respect, to disclose the facts of kidnapping, computer forensics could be of great value because it can allow the policy office to find all necessary information about the forthcoming crime or about the crime that has already been committed (Nelson & Phillips, 2010).

In case with kidnapping, the computer files and hard disk should be investigating for possible photos of the kidnapped victims, stenography, a process by means of which an image is concealed behind another digital image, and deleted files that are possible to extract and recover.

When electronic data has been collected to identify the kind of the incident and introduce evidence of the crime, it is important to organize a meeting with the witness who can provide details of the incident (Kannellis, 2006). The one-to-one interview can help me to get into more detail about the case and compare the testimony with the files and pictures found on computer (Anson & Bunting, 2007).

One of the most frequently used tools for concealing information is stenography, which is also considered the major threat to governmental security (Caloyannides, 2004). This way of information coding is used by most criminals who strive to conceal the images and photos (See Appendix 1). Before evaluating and deliberating the evidence, it is essential to carry out baseline data network analysis to understand the crime scene.

Further steps will determine the normal usage and topology of the network, interview with system administrators, logs of affected and associated systems, and outputs received from IDSs.

The data that can be obtained from computer is stored in a running system memory, which constitutes as great evidential value (Anson & Bunting, 2007). As soon as the running processes are determined and connections are active, it is possible to generate a clear picture of what actions have been performed by a user, a potential suspect.

Interestingly, in case the kidnapper does not realize the face of the crime, it is reasonable to build in specific equipment that can permit the investigator to control subsequent course of action provided by the criminal. Such an approach will increase chances for discovering new evidence proving the fact of kidnapping (Anson & Bunting, 2007).

While examining the evidence, it is purposeful to refer to various types of evaluation, including live analysis and cross-sectional assessment. The first step to be taken is detecting the first activity that was carrying out on computer at the moment of the accident (Anson & Bunting, 2007).

Using cross-sectional analysis through acquisition, analysis, and reporting, it is possible to detect the fact of criminal’s using several computers for storing data about the victims (Mohay, 2003). There is a great probability that the attacker can use more than one database for allocating pictures, documents, and stenography to distract the crime scene investigators.

Finally, although some of the resources detected on the computer of the accused, they can be applied to characterize and define the background, including his activities and hobbies. Therefore, this information will also be helpful for forensic professional who make the psychological profile of the kidnapper.

References

Anson, S., & Bunting, S. (2007). Mastering Windows Network Forensics and Investigation. New Jersey: John Wiley and Sons.

Caloyannides, M. A. (2004). Privacy Protection and Computer Forensics. US: Artech House.

Kannellis, P. (2006). Digital Crime and Forensic Science in Cyberspace. US: Idea Group Inc.

Mohay, G. M. (2003). Computer and Intrusion Forensics. US: Artech House.

Nelson, B., & Phillips, A. (2010). Guide to Computer Forensics and Investigation. US: Cengage Learning.

More related papers Related Essay Examples
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2019, June 3). Computer Forensics and Digital Evidence. https://ivypanda.com/essays/computer-forensics-2/

Work Cited

"Computer Forensics and Digital Evidence." IvyPanda, 3 June 2019, ivypanda.com/essays/computer-forensics-2/.

References

IvyPanda. (2019) 'Computer Forensics and Digital Evidence'. 3 June.

References

IvyPanda. 2019. "Computer Forensics and Digital Evidence." June 3, 2019. https://ivypanda.com/essays/computer-forensics-2/.

1. IvyPanda. "Computer Forensics and Digital Evidence." June 3, 2019. https://ivypanda.com/essays/computer-forensics-2/.


Bibliography


IvyPanda. "Computer Forensics and Digital Evidence." June 3, 2019. https://ivypanda.com/essays/computer-forensics-2/.

If, for any reason, you believe that this content should not be published on our website, please request its removal.
Updated:
Privacy Settings

IvyPanda uses cookies and similar technologies to enhance your experience, enabling functionalities such as:

  • Basic site functions
  • Ensuring secure, safe transactions
  • Secure account login
  • Remembering account, browser, and regional preferences
  • Remembering privacy and security settings
  • Analyzing site traffic and usage
  • Personalized search, content, and recommendations
  • Displaying relevant, targeted ads on and off IvyPanda

Please refer to IvyPanda's Cookies Policy and Privacy Policy for detailed information.

Required Cookies & Technologies
Always active

Certain technologies we use are essential for critical functions such as security and site integrity, account authentication, security and privacy preferences, internal site usage and maintenance data, and ensuring the site operates correctly for browsing and transactions.

Site Customization

Cookies and similar technologies are used to enhance your experience by:

  • Remembering general and regional preferences
  • Personalizing content, search, recommendations, and offers

Some functions, such as personalized recommendations, account preferences, or localization, may not work correctly without these technologies. For more details, please refer to IvyPanda's Cookies Policy.

Personalized Advertising

To enable personalized advertising (such as interest-based ads), we may share your data with our marketing and advertising partners using cookies and other technologies. These partners may have their own information collected about you. Turning off the personalized advertising setting won't stop you from seeing IvyPanda ads, but it may make the ads you see less relevant or more repetitive.

Personalized advertising may be considered a "sale" or "sharing" of the information under California and other state privacy laws, and you may have the right to opt out. Turning off personalized advertising allows you to exercise your right to opt out. Learn more in IvyPanda's Cookies Policy and Privacy Policy.

1 / 1