Preview

Cyber Forensics: Development of a Case Hypothesis

Good Essays
Open Document
Open Document
1026 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Cyber Forensics: Development of a Case Hypothesis
Throughout time past, forensic science disciplines have helped solved numerous crime investigations and it has given impelling testimony in the area of court trials. In order to reduce the sagacity of siding or bias situation and avoidance in prosecuting innocent victims, it is important to analyse, validate and have proper presentation of digital evidence in the context of cyber forensics examinations. [1] (Noblett et al, 2000) in this essay we will discuss on various topics that describe, explain or illustrate on issues such as the processes that assist in the development of a case hypothesis and as well as alternative hypothesis. It will also cover the processes in which how validation check and test are conducted to determine the accuracy of the digital evidence. Furthermore, we will look into the deductive, inductive and abductive reasoning in the field of cyber forensics. Lastly, the essay will also cover on the processes that would improve the communication and presentation of case analysis to the solicitors and courts. INTRODUCTION
Before the term cyber forensics was introduced in the late 1960s, most crimes are formally solved using traditional forensic science disciplines. Before the first PC computer was invented, crimes in those days were not as complicated as compared to today. In this introduction section, we will distinguish between what is forensic science and how it is different from cyber forensics.
Forensic science depends on the capability of the research scientists to develop a case report based on the outcome of a scientific review. For instance , a DNA report analysis of a murder case can be undertaken without the prior knowledge of the victim’s name or exact situation of the crime.[2] (Chakraborty, R.1990)
On the contrary, cyber forensics science’s main focus is driven on information discovered during the investigation. However the challenge lies in the search hunt of valid and admissible evidence in the media storage of a

You May Also Find These Documents Helpful

  • Powerful Essays

    272. Newman, R. (2007). Computer Forensics: Evidence Collection and Managment. Boca Raton FL: Taylor & Francis Group. LLC.…

    • 4846 Words
    • 17 Pages
    Powerful Essays
  • Powerful Essays

    In this case study I will examine the forensic evidence (limited to the main ballistic evidence), that was presented in the criminal trials and the forensic evidence that was introduced by the prosecution.…

    • 1606 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    Cis 417 Assignment 1

    • 755 Words
    • 4 Pages

    There are many challenges for a computer forensics specialist and everyone faces the same challenges. There first challenge is to find a way to examine an increasing number of digital devices, each containing an immense volume of data, in a timely manner with limited resources (Charles L Cohen, n.d.). Another challenge is the fact that offenders are finding easier ways to store data. They…

    • 755 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Assignment5

    • 285 Words
    • 1 Page

    The three phases of computer forensic investigations are; acquire the evidence, authenticate the evidence, and analyze the evidence. In acquiring the evidence the data is collected. Authenticating the evidence a chain of custody is used for the evidence to ensure its trustworthiness. Finally in analyzing the evidence the data is viewed and if need be a copy of the evidence can be created.…

    • 285 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Case Project 5-3 & 5-5

    • 865 Words
    • 4 Pages

    Under the silver platter doctrine, evidence obtained by state agents in an unreasonable search and seizure was admissible in a federal criminal trial, where no federal agent participated in a search and seizure and the state officers did not act solely on behalf of the United States (Hills, 1999). Simply put, federal officers cannot allow state police to do the dirty work, and then claim that they did not violate search and seizure rights. By analogy, no government agent can stand by, allow a private citizen to violate search and seizure strictures on the government 's behalf, and then claim innocence as to the violation (Hills, 1999).…

    • 865 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Following the proper procedures within the means of the law and following a chain of command will help to ensure a conviction in cybercrimes. There are many different kinds of cybercrime, knowing the investigative process for the differences will assist in locating electronic evidence. The electronic evidence may include following Internet Protocol (IP) addresses, computer history logs, emails, files, and videos. While poor investigating will let the criminal avoid prosecution, conducting a proper cybercrime investigation can ensure a conviction.…

    • 664 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Identity theft has ruined the lives of many. It is crucial and necessary to educate more professionals in the computer forensic field to combat this and many other cybercrimes. The following paper will help inform about identity theft and to explain how it can be resolved through digital forensics. What is identity theft? The U.S. Department of Justice defines it as when “someone wrongfully obtains and uses another person 's personal data in some way that involves fraud or deception, typically for economic gain.” There are many ways to do this. One way is when dumpster divers spend time looking through trash in…

    • 1160 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    After the preservation phase, forensics are required to locate and identify any evidence that can be used to aid the crime case. There are several locations where evidence are usually found such as in the hard drive on the user’s personal computer, laptop, smart phone or tablet (ACPO, 2012). It is also critical that forensics are aware of the intention of the particular investigation. This aids in the forensics' efforts of locating digital evidences that are relevant to the case. For example, in the case of a server intrusion, forensics should look out for signs such as a rootkit installation, analyze configuration files, logs files and etc. These are possible locations and processes where traces of evidence can be picked out from (Carrier and Spafford, 2003).…

    • 257 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    There are advantages and disadvantages when it comes to computer forensics. This field is relatively new and criminal matters usually dealt with physical evidences. This makes electronic evidence something very new. Fortunately it has been a helpful tool wherein important data needed for a case that has been lost, deleted or damaged can be retrieved.…

    • 570 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The handling of evidence at the scene is critical to maintaining the integrity of the evidence (Bunting, 2012, p. 90). Proper tools for acquiring the evidence at the scene are essential. These tools can be categorized as discipline-specific hardware and software, and general tools and supplies. Bunting (2012), Gogolin (2013), Kral (2011) and Nelson, Phillips and Steuart (2010) provide lists of item that a digital forensics investigator should have at the scene. The table at the end of this section summarizes the suggestions of these authors.…

    • 535 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Real Csi

    • 860 Words
    • 4 Pages

    This video raised many legitimate concerns about forensic science and the use of forensic science. Credentialing, regulations that are not in place, mistakes made by “experts”, and lawmakers using their opinions as expert testimony are all real problems with the forensic science field.…

    • 860 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Digital Forensics Essay

    • 1416 Words
    • 6 Pages

    Digital forensic sciences created as a unrestricted field in late 1990s and mid-2000 when computer based corruption began developing with the expanding prevalence of computers and particularly the Internet. Of the around half of respondents who experienced no less than one security occurrence a year ago, completely 45.6 percent of them reported they'd been the subject of no less than one focused on…

    • 1416 Words
    • 6 Pages
    Good Essays
  • Good Essays

    Digital Forensic Analysis

    • 648 Words
    • 3 Pages

    Strategies in digital forensics do not have an institutionalized and predictable model. There is a need for a universal process inside forensic examinations. Although fundamental procedures for performing a comprehensive digital forensic investigation, most procedures are not universal and in this way don’t have the capacity to be exchanged through the cases. In a digital forensic investigation, interview process is very important while deciding who, what, where, when, why, and how. “A properly conducted forensic interview turns a potentially reluctant subject into an information-giving source” (Vinluan, 2015). Regardless of whether the reason for the interview is to collect information or analysis into criminal’s behavior, the interviewer’s responsible is to progress a completed comprehension of the truths. Moreover, a constructive interview process is crucial when collecting evidence and controlling the investigation in the correct direction. This paper will concentrate on the interview process in connection to incident response and investigation, and outline an interview methodology needed to carry out the digital forensic investigation in three sections. Preparing for an interview…

    • 648 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Computer Forensics

    • 504 Words
    • 3 Pages

    The growing capability of computers and applications as well as the ever increasing level of interconnectivity and information sharing has made it easier for persons with malicious intent to use computers to plan terrorism attacks, conduct intellectual property theft, credit card fraud and hack computer systems to gain access to confidential information. The sophisticated nature of these crimes has seen the growing need for experts in computer forensics.…

    • 504 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Forensic science has various influences on crime, investigation and the people that are involved. Forensic science has a connection with the courts to ensure crimes are getting solved and justice is being served to those that commit crimes. With the help of forensic science, crimes are being solved from a human and technological aspect. This paper highlights numerous discussions on how forensic science plays a role in criminal justices system, security, media and the law.…

    • 1454 Words
    • 6 Pages
    Powerful Essays

Related Topics