Computer Crime Investigations Forensics Research

Essay by ladystallionUniversity, Bachelor'sF, November 2004

download word file, 2 pages 4.2

Abstract

The research on Computer Crime Investigations Forensics and Tools and Technology article has covered a short outline from Journal of Forensic Identification. Some parts of the research were interesting and elementary for a non-tech or tech savvy on providing reference on computer forensics and other related computer fields.

Computer Crime Investigations Forensics Research

Introduction

The Research and Evaluation I - RES/341 course has presented an opportunity for research of my choice in Computer Crime Investigations Forensics and Tools and Technology by preparing keys points, to define the business research and its purpose, explain the business problem(s) under investigation, identify the parties involved in conducting the research and describing the method(s) used to conduct the research.

Research and Purpose

The Computer Crime Investigation Forensic Tools and Technology research and purpose is, "basic categories of evidence established: live versus dead systems; logical versus physical analysis; the dispersal of evidence over networks; the complications from encryption, data fragmentation, steganography which refers to the practice of concealing a text message inside another file, usually a photograph, anonymity; the importance of procedures and protocols.

Unlike some other pontificators about computer investigations, this recognizes that the term "forensic" puts us in the legal arena, and the there are too many aspects of this technology for one person to master them all" (Journal of Forensic Identification).

Problems under Investigation

The authors provide problems under investigation such as crime reconstruction practices and explain the importance of terms familiar to those involved with forensics: comparison, source identity, and significant differences. Second, material under investigation is the technical computer network auditing tools that are preinstalled in many systems. The Microsoft products encountered task of recreating electronic evidence in a Unix environment and how tricky it is when built. The electronic evidence in a Unix environment and the effects on...