Ask a question from expert

Ask now

Assignment on Computer Forensics

12 Pages4209 Words154 Views
   

Added on  2021-07-07

Assignment on Computer Forensics

   Added on 2021-07-07

BookmarkShareRelated Documents
Word count: 3059Comphuter ForensicsNameIDProgramme nameUniversity name
Assignment on Computer Forensics_1
ContentsA.INTRODUCTION: TRENDING TODAY................................................................................................................................1B.COMPUTER FORENSICS.................................................................................................................................................1C.CYBER CRIMES............................................................................................................................................................2D.SOCIAL IMPACT...........................................................................................................................................................3E.LEGAL ASPECT............................................................................................................................................................4F.ECONOMIC ASPECT......................................................................................................................................................5G.ETHICAL ASPECT..........................................................................................................................................................6H.POLITICAL ASPECT.......................................................................................................................................................7I.ENVIRONMENTAL ASPECT.............................................................................................................................................7J.FUTURECHALLENGESINCOMPUTERFORENSICS................................................................................................................7K.CONCLUSION..............................................................................................................................................................8REFERENCE........................................................................................................................................................................8a
Assignment on Computer Forensics_2
Computer ForensicsKeywords— computer forencis, challenges, computer forensics A.INTRODUCTION: TRENDING TODAYWith the rapid development of technology, lawprosecution and the legal formation face numberof new challenges every day. Most countries havecommitted several forms of criminal acts to recordthe crime related evidence in form of digital.Furthermore, crimes have now stepped up to thecyberspace today and therefore, digital basedcrime related evidence recording is quite practicaland efficient in law enforcement. Thus, computersecurity professionals must be well aware of legalsystem requirements related to digital evidencerecording of crimes in field of computer forensics.Forensic technologies involve various tools andmethods to recover data from a seized computersystem in an evidence form.B.COMPUTER FORENSICSGarfinkel [1] states that in digital forensics, theretrieving data can be from any data source suchas computer memory, hard drive or a printed hardcopy taken from any computer related system.Further, Popescu et al [2] highlight that thisabstraction must be done in such a way that fulfilsthe needs of the event or crime to verify as a solidevidence. Usually, it can be expected to delete oralter the system stored data to protect theconvicting facts during a crime [1][2][3]. Thus, byagreeing to author reviews, the core functionalityof computer forensics can be argued as theretrieval of such deleted or altered data mainly.Digital forensics can be divided in to several sub-disciplines such as computer Forensics, NetworkForensics, Mobile Devices Forensics, DigitalImage Forensics, Digital Video/Audio Forensicsand Memory forensics [4]. this report mainlyfocus on the sub-discipline of computer forensicswhich indicates the identification, protection,assembly, investigation and reporting on evidencegathered in digital storage media, computers andlaptops which increases the efficiency of crimeinvestigations and legal proceedings.The cyber security professionals have advised therequirement to seizure the trend early given thefact that Sri Lanka is dignified to unveil itsstriving programme to turn out to be a regionalcommercial hub. The overall yearly expenditureof all security breaches is estimated as nearly $2.1 trillion globally by 2019 and it is exactly 4times bigger than the overall yearly expenditure in2015. Digital and IT literacy of people in SriLankan is reported as 38.7% and 28.3%respectively. Further, it is reported that nearly57% mobiles and 38% computers are connected tointernet in Sri Lanka generally. However, as perthe records of Sri Lanka Police, cyber security isrecognised as a very susceptible problem among1
Assignment on Computer Forensics_3
local society due to the lack of knowledge andawareness among public in surfing the internetsecurely [5]. Country aims for an aspiration with 5years strategy from 2018 to 2023 to develop acyber-crime safe nation. Thus, it can be arguedthat if the country can adopt to the new strategy, itwill create a trusted and resilient cyber securityenvironment in Sri Lanka to allow the people togain advantages of digital technology and enabledevelopment [5].C.CYBER CRIMESComputer aided crimesComputer aided crimes include the all the crimesthat can be done with the assistance of computersalthough they also can be done without computerssuch as theft and fraud, cyber-stalking and cyber-bullying, corporate and government intelligence,illegal pornography and paedophilia (e.g. childabuse, sexual exploitation).Computer based crimes / computer integritycrimesComputer based crimes include the all the crimesthat are performed using computers technologyand these crimes cannot be performed withoutcomputers such as malware (viruses, trojans andworms), dos attacks, website defacement, hackingand system trespassing (packet sniffing, portscanning, key loggers, password cracking),spamming and adware.Evidence provision non-computer and computerbased crimesAs stated by Britz [6], computer criminals areinspired by revenge, greed, other emotions andanger, sexual impulses, political motives andpsychiatric illnesses. Research up to the presenttime specifies that there are no substantialsociodemographic variances among traditionalcriminals and computer criminals. In contrast togeneral myths, Nelson et al [7] state that computercriminals are not more introverted, intelligent, orsocially incompetent than the other criminals orgeneral public. Even though most computercriminals are younger and male, compared totraditional criminals, that demographic profiledescribes the majority of persons involved indangerous and criminal activities and, similar totraditional criminals, computer criminals areinclined to age out of these actions [8].Particular computer criminal actions for examplethose focused at companies (for instance, fraud,intellectual property theft, data misuse) areinterrelated with specific types of offenders [1][6][7]. In such case, the highest risk comes mainlyfrom inside workers than external parties oforganization. Therefore, it can be argued that it isdependable on white collar crime in general. Inthe insider type of offenders, dissatisfied workersare responsible for the highest financial effect tobusinesses. According to Nelson et al [7], theseworkers frequently function behind computer2
Assignment on Computer Forensics_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Digital Forensic Evaluation
|10
|557
|325

Digital Forensic Report for Exotic Mountain Tour Service
|12
|3002
|251

Digital Forensic Technology: Evidence Recovery and Future Challenges
|8
|2390
|82