Quality Control of Digital Forensics Essay

Exclusively available on Available only on IvyPanda® Made by Human No AI

Introduction

The quality control over computer forensic products is necessary because of the growth of the Internet services. While providing a variety of time-saving possibilities, the Internet also creates many opportunities for malicious activities and security breaches. Forensic practice shows that computer-related cases can be complicated for various reasons. The complexity of such cases leads to the necessity of proper quality control. Thus, the investigator and the lab are challenged not only with solving a case but also providing the appropriate evidence and maintaining the required level of quality. Therefore, the level of quality must be regulated by specific documentation and entrusted to specific individuals.

Computer services and the Internet present possibilities for a variety of criminal activities. Nevertheless, crimes can also be prevented and investigated with the usage of computer products. For instance, the analysis of mobile applications can play a critical role in the investigation and prevention of cyber crimes, as stated by Mahajan, Dahiya, and Sanghvi (2013). This point is further expanded by Grispos, Glisson, and Storer (2013) also touching upon cloud services. Both of these studies focus on whether or not data remaining in smartphones or cloud services can be used as evidence in solving cases. To summarize, the modern forensic practice relies not only on the traditional methods of gathering evidence and data but also on computer products, which proves to be a useful measure.

However effective the digital forensics can be, there is rarely a reason to use all of its resources. (Garfinkel, 2013). Not every forensic practice in the field of computer-related crimes is effective. Gathered data on the measures used by criminals to ensure their safety while committing a cyber crime indicates this ineffectiveness. The work by Stephenson and Gilbert (2013) presents the reader with methods used by professional hackers to commit cyber crimes. The increasing complexity of cyber crimes is also elucidated in the book. Thus, forensic units are facing a problem of preventing and solving cyber crimes while also coping with the increasing quality of cyber criminals’ skills.

Another important topic in the field of digital forensic is the discussion of the “error.” It is frequently discussed amongst many researchers (Christensen, Crowder, Ousley, & Houck 2014). The increasing standards of quality control are a direct result of this discussion. The effectiveness of digital forensics is provided by the quality of the investigations which can be entrusted to a specific document – Quality Assurance Manual, and an individual that is observing the abidance of the forensics units – Quality Manager (Barbara, 2013). With these assets operating properly, the percentage of errors in the forensic practice can be minimized.

Conclusion

Hence, one can see that quality control of digital forensics can and must be provided by the above-mentioned document and specifically nominated person. Although cyber crimes are difficult to investigate and solve, and the methods used in the process can be redundant, the effective procedure of investigating a cyber crime has become easier over the decades. This is a result of spreading computer products and the amount of evidence they are capable of storing. Today’s quality control of digital forensics is a necessary measure that contributes a lot to the procedure of investigating cyber crimes.

References

Barbara, J. J. (2013). Quality assurance practices for computer forensics: Part 2. Forensic Magazine. Web.

Christensen, A. M., Crowder, C. M., Ousley, S. D., & Houck, M. M. (2014). Error and its meaning in forensic science. Journal of Forensic Science, 59(1), 123-126.

Garfinkel, S. L. (2013). Digital forensics. American Scientist, 101(5), 370-377.

Grispos, G., Glisson, W. B., & Storer, T. (2013). Using smartphones as a proxy for forensic evidence contained in cloud storage. 46th Hawaii International Conference on System Sciences, 1-10.

Mahajan, A., Dahiya, M. S., & Sanghvi H. P. (2013). Forensic analysis of instant messenger applications on Android devices. International Journal of Computer Applications, 68(8), 38-44.

Stephenson, P., & Gilbert, K. (2013). Investigating computer-related crime. New York, NY: CRC Press.

More related papers Related Essay Examples
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2022, January 27). Quality Control of Digital Forensics. https://ivypanda.com/essays/quality-control-of-digital-forensics/

Work Cited

"Quality Control of Digital Forensics." IvyPanda, 27 Jan. 2022, ivypanda.com/essays/quality-control-of-digital-forensics/.

References

IvyPanda. (2022) 'Quality Control of Digital Forensics'. 27 January.

References

IvyPanda. 2022. "Quality Control of Digital Forensics." January 27, 2022. https://ivypanda.com/essays/quality-control-of-digital-forensics/.

1. IvyPanda. "Quality Control of Digital Forensics." January 27, 2022. https://ivypanda.com/essays/quality-control-of-digital-forensics/.


Bibliography


IvyPanda. "Quality Control of Digital Forensics." January 27, 2022. https://ivypanda.com/essays/quality-control-of-digital-forensics/.

If, for any reason, you believe that this content should not be published on our website, please request its removal.
Updated:
This academic paper example has been carefully picked, checked and refined by our editorial team.
No AI was involved: only quilified experts contributed.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment
1 / 1