Preview

Cis 417 Assignment 1

Good Essays
Open Document
Open Document
755 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Cis 417 Assignment 1
Assignment 1:
CIS 417
Professor DR. Ed Lindoo

As a system forensics specialist I am here to help your business achieve goals based on security and confidentiality. Some of my basic tasks and high level investigation process is to use evidence to reconstruct past events and activities. Forensic specialist also use evidence to gain a better understanding of a crime (John R. Vacca & K Rudolph, 2011). I will also use this evidence to show possession and handling of digital data.
There are many challenges for a computer forensics specialist and everyone faces the same challenges. There first challenge is to find a way to examine an increasing number of digital devices, each containing an immense volume of data, in a timely manner with limited resources (Charles L Cohen, n.d.). Another challenge is the fact that offenders are finding easier ways to store data. They
…show more content…
The fact that by time a lot of the evidence is examined it’s normally too late and can’t even be used. A lot of forensic examiners do not understand investigation, causing them to overlook relevant information and expand resources (Charles L Cohen, n.d.). This is why training is so important but lack of funds can be another limitation because there is only so much money to spend on training and resources.
Computing devices are used in crimes today and can affect a company’s data and information. Some examples of computing devices that are used in crimes are smart phones, computers, digital video recorders, digital cameras, gaming systems that store data, digital music players and other electronic storage devices. Some of these devices can shutdown an operation to a business causing millions of dollars. An example would even be a DOS attack which could shutdown people from accessing your companies website. This means that wouldn’t be able to make purchases or check there

You May Also Find These Documents Helpful

  • Better Essays

    I will say that some of the most important items in a computer for a forensic investigation are: Drivers, running programs, installed programs, operating system, computer name, security setting and configurations, and firewall configurations.…

    • 664 Words
    • 3 Pages
    Better Essays
  • Good Essays

    CIS 348 ASSIGNMENT 1

    • 960 Words
    • 4 Pages

    Describe the different levels and types of resources required for producing each deliverable described in the assignment summary.…

    • 960 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Collecting evidence is an essential factor to the world of criminology. The evidence can determine whether the person is guilty or not guilty. The matter of handling evidence correctly becomes a priority to anyone who is working in the case.…

    • 725 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Assignment5

    • 285 Words
    • 1 Page

    The three phases of computer forensic investigations are; acquire the evidence, authenticate the evidence, and analyze the evidence. In acquiring the evidence the data is collected. Authenticating the evidence a chain of custody is used for the evidence to ensure its trustworthiness. Finally in analyzing the evidence the data is viewed and if need be a copy of the evidence can be created.…

    • 285 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Digital Crime

    • 5203 Words
    • 21 Pages

    Podgor, Ellen. (n.d.). COMPUTER CRIME. encyclopedia of crime and justice entries. Retrieved (2010, May 6) from http://www.highbeam.com/doc/1G2-3403000048.html…

    • 5203 Words
    • 21 Pages
    Powerful Essays
  • Good Essays

    Real Csi

    • 860 Words
    • 4 Pages

    This video raised many legitimate concerns about forensic science and the use of forensic science. Credentialing, regulations that are not in place, mistakes made by “experts”, and lawmakers using their opinions as expert testimony are all real problems with the forensic science field.…

    • 860 Words
    • 4 Pages
    Good Essays
  • Good Essays

    This entails detailed documentation with digital and video cameras or, if available, a 3-D scanner. In this case, sketches and diagrams should be created. During the evidence-collection process, it is crucial that the crime scene investigator follow proper procedures for collecting, packaging and preserving the evidence, especially if it is of a biological nature (Forensic Science Implied, 2015).…

    • 1117 Words
    • 5 Pages
    Good Essays
  • Better Essays

    During a crime scene investigation, evidence are the most important aspects to solve the crime. The evidence left on or around the scene can be used to investigate and identify the perpetrator. “Once the crime scene has been thoroughly documented and the locations of the evidence noted, then the collection process can begin. The collection process will usually start with the collection of the most fragile or most easily lost evidence. Special consideration can also be given to any evidence or objects which need to be moved. Collection can then continue along the crime scene trail or in some other logical manner.” (Schiro, n.d.)…

    • 1311 Words
    • 6 Pages
    Better Essays
  • Better Essays

    Digital Evidence

    • 799 Words
    • 4 Pages

    This paper will help explain the basic understanding of computer forensics. I will also identify five areas in computers and computer application a forensic investigator can look for digital evidence. I will identify three types of criminal investigations that can utilize the services of computer forensic investigators. This paper will help with the understanding of computer forensics.…

    • 799 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Computer Forensics

    • 857 Words
    • 4 Pages

    In this PBL 1 we learn about computer forensics lab and how do their handle a crime case. The uptake of technology has been just as widespread in the criminal world as everywhere else. This means that digital forensics is not just about “digital crime” such as hacking. Traditional crime can now be investigated by looking at its digital aspects, for example recreating the movements of a criminal’s mobile phone around a town or someone’s web-based research about the location of a burglary. The discipline of digital forensics involves the knowledge and skills necessary to investigate all types of cybercrime, including fraud, data theft, and identity theft and cyber terrorism. The role of the digital forensic investigator has emerged to investigate these and other crimes.…

    • 857 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    2. Forensic science has been increasingly used by the criminal justice system because of its growing accessibility. Technological advances over the last hundred years have made methods such as finger printing, blood and DNA analysis, and other forms of identification much easier for forensic scientists to perform, thus paving the way for the development of this field. Similarly, there has been an increased popularity for…

    • 625 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Computer forensics

    • 2184 Words
    • 8 Pages

    People who try to steal or seek other people 's personal information is growing rapidly in today 's society. Before we know it, a certain person may have access to your bank account ; before you know that your account is empty. You can access your e -mails ; before you know it your account will be hacked. Social networks to mobile phones ; People can even hide some things in images if they can certainly not be accessed. While we may delete files from our computer system, it does not leave your system immediately. Yes, it was removed but it is still floating around on your hard drive , making it easy for someone to easily recover the deleted file . This will include some different amount of information about how we can access hidden information , delete, copy information and hide some things in many ways . There will be discussions , explanations, tips, definitions and analytical critical information we need to know ; also accompanied by numerous screen shots of the work . Programs like Winhex , ProDiscover basic and SilentEye also play a monumental role in the report. Regarding the report , it will be in charge of anti- forensic techniques such as data hiding , wiping secure , encryption, file deletion, steganography and much more . After everything is done , then it will need a picture of the USB , so it can be further improved and used for activities and future tasks.…

    • 2184 Words
    • 8 Pages
    Better Essays
  • Powerful Essays

    CSS350 IP5

    • 6832 Words
    • 19 Pages

    In today’s world it is an indisputable fact that computers and digital devices are a part of our everyday lives. As such they are a part of our society whether they are used for business or for personal reasons. There are many uses for computers. We can use them to track our finances, keep databases of information about our clients, and use them to save pictures and documents. Sometimes computers are used in the commission of a crime like hacking systems for credit card information or launching computer viruses against a target. Sometimes they are used to communicate with others about the details of a crime, plan a crime, or share illegal media like child pornography. Other times computers can be misused and lead to loss or theft of data resulting in system downtime or monetary losses for an organization.…

    • 6832 Words
    • 19 Pages
    Powerful Essays
  • Satisfactory Essays

    DIGITAL FORENSIC 2

    • 1390 Words
    • 9 Pages

    DIGITAL FORENSIC Dr. Rakish DIGITAL FORENSIC Digital Forensic Science (DFS): “The use of scientifically derived and proven methods toward the preservation, collection, validation, identification, analysis, interpretation, documentation and presentation of digital evidence derived from digital sources for the purpose of facilitating or furthering the reconstruction of events found to be criminal, or helping to anticipate unauthorized actions shown to be disruptive to planned operations.” Course Overview Digital forensics is a maturing scientific field with many sub-disciplines. Computer forensics • The goal of computer forensics is to explain the current state of a digital artifact; such as a computer system, storage medium or electronic document.…

    • 1390 Words
    • 9 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Week 5 Assignment

    • 349 Words
    • 1 Page

    A computer forensic investigation has three phases. List what they are and describe the activities that happen in each phase. The three phases of computer forensic investigations are; acquire the evidence, authenticate the evidence, and analyze the evidence. In acquiring the evidence the data is collected. Authenticating the evidence a chain of custody is used for the evidence to ensure its trustworthiness. Finally in analyzing the evidence the data is viewed and if need be a copy of the evidence can be created.…

    • 349 Words
    • 1 Page
    Satisfactory Essays