262 valuable data that has been lost and deleted by

This preview shows page 262 - 266 out of 363 pages.

We have textbook solutions for you!
The document you are viewing contains questions related to this textbook.
Network+ Guide to Networks
The document you are viewing contains questions related to this textbook.
Chapter A / Exercise 67
Network+ Guide to Networks
Dean/West
Expert Verified
262
We have textbook solutions for you!
The document you are viewing contains questions related to this textbook.
Network+ Guide to Networks
The document you are viewing contains questions related to this textbook.
Chapter A / Exercise 67
Network+ Guide to Networks
Dean/West
Expert Verified
Valuable data that has been lost and deleted by offenders can be retrieved which becomes substantial evidence in court. Legal professionals are able to produce data in court that were previously impossible. The first setback when using electronic or digital evidence is making it admissible in court. Data can be easily modified. Analyst must be able to fully comply with standards of evidence required in the court of law. The computer forensic analyst must show that the data is tampered. His or her own investigation must also be fully documented and accounted for. Computer forensics must also training of legal standard procedures when handling evidence. 20.8 Disadvantages of computer forensics ( 9 ). The main disadvantage is the cost of when retrieving data. Computer forensic experts hire per hour. Analysis and reporting of data can take as long as 15 hours but it will also depend on the nature of the case. Another one is that when retrieving data, analyst may inadvertently disclose privilege documents. Legal practitioners involved in the case must also have knowledge of computer forensics. If not they will not be able to cross examine an expert witness. This also applies to the judge, solicitors and barristers. Computer forensics is still fairly new and some may not understand it. The analyst must be able to communicate his findings in a way that everyone will understand. Although computer forensics has its disadvantage, this can be solved by the party involved. Evidence on the other hand can only be captured once. The use of computers and the rise of cyber crimes also call for an equally high the method of stopping it. Conclusion: The preceding has been based on the use of computer forensics to exploit stored Digital information. Certainly, this need will grow dramatically in the future, as more and more of society's information are stored electronically. However, a potentially even 263
larger use may be to document activities and processes that take place electronically. In other words, to examine data that is not only at rest, but also that which is in motion. And while the law will slowly evolve and accept more and more technical issues, computer forensic specialists will continue the process of education for all parties in the legal process. References: 1. 2. 3. 4. l 5. ( ) 6. 7. ( - 1.html ) 8. - forensics/ ) 9. ( - computer-forensics.html ) 264
Tip: Wondershare Data Recovery Wodershare's Data Recovery software gives you the opportunity to quickly & easily recover lost

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture