Top-Rated Free Essay
Preview

pros-and-cons-computer-forensics

Good Essays
570 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
pros-and-cons-computer-forensics
pros-and-cons-computer-forensics
The Advantages and Disadvantages of Computer Forensics
Computer forensics has become an important of litigation. Computers have become an important part of your lives. This does not exclude criminals who have the technical “know how” of hacking into computer network systems. Electronic evidence has played a role in court but obtaining can be difficult.
There have been issues of authenticity concerned with this type of evidence. Nonetheless it still used today with the help of legal standards to make them admissible in court. Computer forensics is beneficial but it also has disadvantages.
Computers are the most dominant form of technology. It has been used in variety of purposes which has made digital and electronic evidence important. However there are still setbacks to this field.
Pros and Cons
The exchange of information is taking place every day over the internet. Although this may be convenient for us, it can also pose as an opportunity for criminals. Phishing, corporate fraud, intellectual property disputes, theft, and breach of contract and asset recovery are some of the situations wherein computer forensics can be used.
Apart from the technical aspect, legal issues are also involved. Computer forensic analysts make their investigation in such a way that the electronic evidence will be admissible in court.
There are advantages and disadvantages when it comes to computer forensics. This field is relatively new and criminal matters usually dealt with physical evidences. This makes electronic evidence something very new. Fortunately it has been a helpful tool wherein important data needed for a case that has been lost, deleted or damaged can be retrieved.
Computer forensics' main advantage is its ability to search and analyze a mountain of data quickly and efficiently. They can search keywords in a hard drive in different languages which is beneficial since cyber-crimes can easily cross borders through the internet.
Valuable data that has been lost and deleted by offenders can be retrieved which becomes substantial evidence in court. Legal professionals are able to produce data in court that were previously impossible.
The first setback when using electronic or digital evidence is making it admissible in court. Data can be easily modified. Analyst must be bale to fully comply with standards of evidence required in the court of law. The computer forensic analyst must show that the data is tampered.
His or her own investigation must also be fully documented and accounted for. Computer forensics must also training of legal standard procedures when handling evidence.
The main disadvantage is the cost of when retrieving data. Computer forensic experts hire per hour. Analysis and reporting of data can take as long as 15 hours but it will also depend on the nature of the case. Another one is that when retrieving data, analyst may inadvertently disclose privilege documents.
Legal practitioners involved in the case must also have knowledge of computer forensics. If not they will not be able to cross examine an expert witness. This also applies to the judge, solicitors and barristers. Computer forensics is still fairly new and some may not understand it. The analyst must be able to communicate his findings in a way that everyone will understand.
Although computer forensics has its disadvantage, this can be solved by the party involved. Evidence on the other hand can only be captured once. The use of computers and the rise of cyber crimes also call for an equally high the method of stopping it.

You May Also Find These Documents Helpful

  • Powerful Essays

    272. Newman, R. (2007). Computer Forensics: Evidence Collection and Managment. Boca Raton FL: Taylor & Francis Group. LLC.…

    • 4846 Words
    • 17 Pages
    Powerful Essays
  • Satisfactory Essays

    Iscs 451 Assignment 6

    • 576 Words
    • 3 Pages

    A checklist should be created off of the operating procedures and brought to each crime scene by the investigator. Every electronic device should be photographed before touching anything. The checklist should be followed step by step and every item needs to be put into an evidence bag and tagged. Then a chain of custody document needs to be created for every piece of evidence. No analysis should be done on the original copy of any device. All analysis should be done on system image copies of each…

    • 576 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Case Project 5-3 & 5-5

    • 865 Words
    • 4 Pages

    Under the silver platter doctrine, evidence obtained by state agents in an unreasonable search and seizure was admissible in a federal criminal trial, where no federal agent participated in a search and seizure and the state officers did not act solely on behalf of the United States (Hills, 1999). Simply put, federal officers cannot allow state police to do the dirty work, and then claim that they did not violate search and seizure rights. By analogy, no government agent can stand by, allow a private citizen to violate search and seizure strictures on the government 's behalf, and then claim innocence as to the violation (Hills, 1999).…

    • 865 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Many times, computer forensics practitioners work with traditional forensics experts in criminal investigations to reveal evidence. With frequent work experiences with forensics experts and lawyers, having a general knowledge of relevant laws and ethics is a nice complement to any computer forensics practitioner’s skill set. Furthermore, as many audits are conducted on businesses and illegal organizations are done electronically, computer forensics experts may want to have working knowledge in accounting and/or finance in order to prepare for such jobs.…

    • 524 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab 1

    • 414 Words
    • 2 Pages

    2. Which items within WinAudit’s initial report would you consider to be of critical importance in a computer forensic investigation?…

    • 414 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Following the proper procedures within the means of the law and following a chain of command will help to ensure a conviction in cybercrimes. There are many different kinds of cybercrime, knowing the investigative process for the differences will assist in locating electronic evidence. The electronic evidence may include following Internet Protocol (IP) addresses, computer history logs, emails, files, and videos. While poor investigating will let the criminal avoid prosecution, conducting a proper cybercrime investigation can ensure a conviction.…

    • 664 Words
    • 3 Pages
    Good Essays
  • Better Essays

    We attempt Earth-place discipline in initiative investigations, e-exploration, information processing system protection incident answer, and digital forensics, and have cars over 50,000 digital investigators cosmopolitan. Some of our most epidemic courses end: EnCase ® v7 Transition Designed for EnCase Forensic users who are upgrading from a previous version to Version 7, the EnCase v7 Transition course details the unaccustomed features of Version 7, spotlight specifically the areas of the fruit that differ significantly from anterior versions. To chronicle for this passage, a use must have accomplished Computer Forensics II or hold an EnCE ®certification. EnCase Computer Forensics I Practical exercises and real-life simulations stipulate participants with an understanding of proper handling of digital eveidence from hold to acquirement, to the analysis and archiving of the data. EnCase Computer Forensics II Designed for investigators with muscular electronic computer discrimination, prior rhetorical training, and experience second-hand EnCase Forensic. EnCase Startup Training Encase® Start Up on-imposition result training to let you spring-in and rapidly get empty with your new software. EnCase® Start Up is convenient for cull Guidance Software products at no cost. You can refer to it whenever you indigence it; brush-up on shape and secant, or import a new abound…

    • 1310 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    Sometimes there can be a sudden requirement to perform hard drive forensic examination. The goals of your forensic examination can be related to virtually any subject, since any type of case/action can take place. Sometimes many instances you may not always perform a full-scale investigation or “fishing expedition” when reviewing the contents of media; in other words, your forensic examination of media may include criteria that focuses and narrows your examination.…

    • 140 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    2. Forensic science has been increasingly used by the criminal justice system because of its growing accessibility. Technological advances over the last hundred years have made methods such as finger printing, blood and DNA analysis, and other forms of identification much easier for forensic scientists to perform, thus paving the way for the development of this field. Similarly, there has been an increased popularity for…

    • 625 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Identity theft has ruined the lives of many. It is crucial and necessary to educate more professionals in the computer forensic field to combat this and many other cybercrimes. The following paper will help inform about identity theft and to explain how it can be resolved through digital forensics. What is identity theft? The U.S. Department of Justice defines it as when “someone wrongfully obtains and uses another person 's personal data in some way that involves fraud or deception, typically for economic gain.” There are many ways to do this. One way is when dumpster divers spend time looking through trash in…

    • 1160 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    forensic

    • 266 Words
    • 1 Page

    Information technology knowledge and skills are necessary tools of the forensic accountant in a world filled which paperless crimes. At minimum, forensic accountants must know the point at which they should contact an expert in computer hardware or software. Examples of ways that forensic accountants use information technology skills to quarantine data, extract data through data mining, design and implement controls over data manipulation, accumulate baseline information for comparison purpose, and analyze data.…

    • 266 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Forensics has been more precise and has provided better evidence to prosecute the correct individual for the correct crime. With that being said, it is the most beneficial to the criminal justice system and provides the most correct…

    • 479 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    After the preservation phase, forensics are required to locate and identify any evidence that can be used to aid the crime case. There are several locations where evidence are usually found such as in the hard drive on the user’s personal computer, laptop, smart phone or tablet (ACPO, 2012). It is also critical that forensics are aware of the intention of the particular investigation. This aids in the forensics' efforts of locating digital evidences that are relevant to the case. For example, in the case of a server intrusion, forensics should look out for signs such as a rootkit installation, analyze configuration files, logs files and etc. These are possible locations and processes where traces of evidence can be picked out from (Carrier and Spafford, 2003).…

    • 257 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Digital Forensics Paper

    • 1176 Words
    • 5 Pages

    Digital forensics is not a new phenomenon, therefore, why is it, still to this day, not considered a profession. As mentioned in the article, digital forensics has been around since the 1970s when the government first began to develop tools to investigate web based fraud (Losavio, Seigfried-Spellar, and Sloan, 2016). Social scientists have claimed that due to the progression digital forensics has received, such as, specialized knowledge; specialized training; work that is considered great value; credit emptor relations with clients; a code of ethics; cooperative relations with other members; high autonomy levels; and self regulation, since its original inception, that it is indeed a profession (Losavio, Seigfried-Spellar, and Sloan, 2016).…

    • 1176 Words
    • 5 Pages
    Good Essays
  • Better Essays

    Scientific Working Groups

    • 984 Words
    • 4 Pages

    Scientific Working Group on Digital Evidence (SWGDE) “brings together organizations actively engaged in the field of digital and multimedia evidence to foster communication and cooperation as well as to ensure quality and consistency within the forensic community.” The SWGDE works to bring together associations that are actively focused on the field of digital and multimedia evidence to bring communication and collaboration as well as…

    • 984 Words
    • 4 Pages
    Better Essays