Computer Network Forensic.docx

Computer Network Forensic.docx - COMPUTER NETWORK FORENSIC...

Info icon This preview shows pages 1–4. Sign up to view the full content.

View Full Document Right Arrow Icon
COMPUTER NETWORK FORENSIC: 1 COMPUTER NETWORK FORENSIC By [NAME] Course Professor’s Name Institution Location of Institution Date
Image of page 1

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
COMPUTER NETWORK FORENSIC: 2 Executive Summary Computer forensics is an emerging trend which deals with the investigation of computer crimes and the prosecution of such crimes. This kind of the inquiry requires the formulation of critical steps in the process leading up to successful prosecution of individuals. These steps vary depending on the model of forensics all with different impacts on the success of forensic objectives. Before the development of this kind of forensics, many cases were unsolved due to lack of proper tools to investigate the crimes and collect vital evidence. The handling of such evidence was an also improved through the use of digital forensics ensuring that evidence integrity is maintained and was stored correctly to uphold its admissibility and being undisputable in a court of law. These tools are most instrumental where digital devices have been used in the committing of the crime. This type of forensics is mainly aimed at determining the connections between digital evidence and the information extracted in a bid to build a factual basis in the cases which the judiciary can rely on in the pronouncement of justice. It is paramount that digital tools and procedures are followed in the process to ensure that the information being used indeed factual and its integrity is upheld. The methods in committing digital crimes are orchestrated through digital platforms and devices. Therefore, only digital tools can best collect, examine and present the evidence in this crimes sufficiently as opposed to the naked eye. The tools that are used in the extraction and examination of data that may be potential evidence in the case may include FTK and Encase. Over the years many people have suggested and developed varying forensic models and frameworks that aim at accomplishing a singular but differ in processes. Some of the suggestions
Image of page 2
COMPUTER NETWORK FORENSIC: 3 are based on original structures and include improvements and changes that are aimed at increasing efficiency. The structures are based on principles that guide and inform the development of these frameworks. One such policy is reputability of the evidence. This means that the investigator should be able to draw similar conclusions as another investigator if faced with similar circumstances. Auditability is also significant in digital forensics where the investigator's work can be evaluated by another investigator in the aimed of making a determination whether the ideal processes were used. The principle of reproductivity seeks to determine whether the method used could produce the same conclusion when it is used again but with different instruments and conditions and can be produced again later after the original findings are made. Justifiability is also vital in digital forensic investigations where it is required
Image of page 3

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Image of page 4
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern