Tech: Database Forensics Research Paper

Exclusively available on Available only on IvyPanda® Written by Human No AI

Abstract

Data processing involves several activities designed to transform the raw data into a more sophisticated and usable design. Among the activities involved in the process of data processing is data storage. In the process of data storage, there are many places where some part of data can be stored. While these data are stored, there are instances when the data become manipulated or tampered with, and in the process lose the actual meaning of its storage.

Introduction

Database forensic is a specialty equivalent to computer forensic. Like computer forensics, the discipline pursues the typical forensic procedures and makes use of the exploratory practices to the database. In our today’s society, information has so far been claimed as one of the very essential commodities and there are endless questions on what the society without information would look like. The majority of this information is composed and processed in a database. This piece of writing will have an in-depth analysis of database forensics, its obligation in database analysis, and other major results associated with it.

Forensic outcome and result

According to Lucy (2005), almost every single institution is in one way or another connected with data that may involve clients or patient information. Lucy further remarks that these data are usually entrusted to various relevant data protection for safekeeping. The outcome and information obtained from database forensic can be used for several reasons according to Brinkmann & Carracedo (2003).

Brinkmann & Carracedo (2003) observes that one argument in which the outcome of database forensic can be of greater importance to a company is the fact that a company can be able to determine whether the integrity of the company’s data has been compromised, or whether one way or another has violated the users’ privacy. Lucy notes the two reasons are the core of any successful company. This is because the end users’ information usually forms the pillar on which the success of any company is built. By carrying out this analysis, the company will be conveying the message that it ought to verify if its database has been tampered with.

Butler (2009) observes that the outcome of database forensic will equally go a long way into developing a valid file system inclined to the database forensic. Butler easily recognizes that developing modern files, which are not, common with database forensic has made the whole exercise very difficult to analyze as most of the database forensic tools used, do not support them. Mozayani (2010) in a similar response echoes the same sentiments as Lucy and points out that by embracing database forensics, the company will also be able to comprehend and analyze any instance of attack that may have been orchestrated toward its database.

These results will therefore to a great point equip the company with expertise on the susceptibility exploited, therefore, in the process raise the issue of escalating deterrent countermeasures. Mozayani (2010) in addition, views that to analyze data it is pressing to know and understand in-depth how the database is structured. The author remarks that this will simplify the work of analyzing the data and therefore, take less time on the work of the forensic team.

A forensic analysis of the database may center on recognizing operation within a database system or benefit that point out verification of wrongdoing, for instances occurrence of fraud (Graham 2010). In this way, Graham observes that, if the practice is carried out expertly, it will lead to light several fraud cases within a company and in the system either avert the potential occurrence of such case in point or make available the extent of damage caused by such deception.

Shoester (2006) points out that some programs can be used to exercise and analyze data. The software as well makes available audit classification expertise that present acknowledged substantiation of what role or analysis a forensic analyst carried out on the database. According to Shenoi & Peterson (2009), the use of these programs to verify the extent of analysis carried out on the database by a forensic expert performance as a means of validating that database forensic was carried out.

Saitoh & Franke (2009) notes that most of the software and forensic tools used nowadays are not very reliable and precise enough to be used in forensic work. These authors attribute this fact to too little effort shown in researching the topic an issue that has left very few books on the topic being published. Similarly, Saitoh & Franke (2009) insist on the need for more delve into the topic of forensic and mostly that of data.

Conclusion

Database forensic has been reflected from the above article as an exercise that is still in development. From the way, the exercise is carried out on the database to identify instances of tampering with them, to the use of database outcome and results in making important decisions about the safety of the company’s database the exercise is such a significant one. From the above information, one cannot fail to observe the relationship between database forensic and the development of technology. It is in the hypothesis that one realizes there is still much to be done if forensic is to be useful and generally at the rate at which technology is advancing.

Reference list

Brinkmann, B & Carracedo, A (2003) Progress in forensic genetics 9.

Butler, J (2009) Fundamentals of Forensic DNA Academic Press: Washington.

Graham, I (2010) Forensic Technology, Evans Brother’s publishers: London.

Lucy, D (2005) Introduction to statistics for forensic scientists, John Wiley and Sons: New York.

Mozayani, A (2010) the Forensic Laboratory Handbook Procedures and Practice, Springer: New York.

Proceedings from the 19th International ISFG Congress held in Munster, Germany. 2001, Elsevier Health Sciences publishers: New York.

Sako, H, Franke, K & Saitoh, S (2011) Computational Forensics: 4th International Workshop, IWCF 2010 Tokyo, Japan 2010, Springer: New York.

Shenoi, S & Peterson, G (2009) Advances in Digital Forensics V: Fifth IFIP WG 11.9 International Conferences on Digital Forensics, Orlando, Florida, USA, 2009, Springer Publishers: New York.

Shoester, M (2006) Forensics in Law Enforcement‎, Nova publishers: Durban.

More related papers Related Essay Examples
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2022, March 24). Tech: Database Forensics. https://ivypanda.com/essays/tech-database-forensics/

Work Cited

"Tech: Database Forensics." IvyPanda, 24 Mar. 2022, ivypanda.com/essays/tech-database-forensics/.

References

IvyPanda. (2022) 'Tech: Database Forensics'. 24 March.

References

IvyPanda. 2022. "Tech: Database Forensics." March 24, 2022. https://ivypanda.com/essays/tech-database-forensics/.

1. IvyPanda. "Tech: Database Forensics." March 24, 2022. https://ivypanda.com/essays/tech-database-forensics/.


Bibliography


IvyPanda. "Tech: Database Forensics." March 24, 2022. https://ivypanda.com/essays/tech-database-forensics/.

If, for any reason, you believe that this content should not be published on our website, please request its removal.
Updated:
This academic paper example has been carefully picked, checked and refined by our editorial team.
No AI was involved: only quilified experts contributed.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment
1 / 1