1295129.edited.docx - FORENSIC COMPUTING 1 FORENSIC...

This preview shows page 1 - 4 out of 10 pages.

FORENSIC COMPUTING 1 FORENSIC COMPUTING Name Course Professor Institution Date
FORENSIC COMPUTING 2 Technology has led to advancements in recent years and revolutionized many things in the world. With the aid of computers, businesses are performing efficiently and effectively. The dark side of the computers is that it is used for digital crimes, for example, identity theft, hacking, and fraud. Evidence is sourced from the computers and used by judges in courts in the past years. Still, nowadays, with the advancement of digital services, the computer-based evidence is not reliable and considered as a source of evidence. Digital forensics is a discipline that is used to assess, locate and interpret digital data in a situation that involves the discovery and treatment of digital information. Digital forensics is classified into various sections, like computer forensics, which are linked to the study of the contents of a machine, such as an Internet background, log files, whereas Forensic mobile apps are concerned with the extraction of digital information from the handset (Alex and Kishore, 2017, pgs. 193- 205). These two branches have similarities and differences in the recovery of digital evidence. The methods used to extract evidence from the phones are different from those used in personal computers. Mobile devices have different operating systems that have their file formats and file systems, which are very different as compared to personal computers. Furthermore, the methods used to communicate are different, and therefore the extraction of data for the investigators becomes problematic. This makes it hard to examine a phone using essential computer forensic tools. They require specially designed devices that are used by investigators to obtain evidence. The rate at which digital forensic tools are available for smartphones is less as compared to mobile technology. Radio isolation and the devices state at the time of acquisition are the factors that should be considered while using mobile forensic tools ( Freeman, 2017 , pg. 283) . In a computer, an analyst can conduct a static acquisition on a personal computer after he or she has disconnected from the power source because the data is stored in non-volatile memory and also saves the current information in
FORENSIC COMPUTING 3 the network. At the same time, this is not possible in mobile devices because they tend to store the data on a volatile memory, which cannot be recovered once the mobile phone is switched off. Another challenge was that the operating systems of mobile devices are evolving so fast, making the use of mobile forensic tools very difficult. The method used to analyze, procure and preserve the digital forensics data gathered is extremely critical since, whether it is not properly observed, the information is liable to be inadmissible in a court of law. Given a few basic program and hardware variations, the techniques utilized with both a machine and a handheld device are the same. A crime must first be committed and be reported by a witness to the law enforcement officers. The

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture