Computer Forensics Assignment: Data Analysis, Legal Factors, and Tools
VerifiedAdded on 2023/01/09
|5
|1028
|55
Homework Assignment
AI Summary
This assignment solution provides an overview of computer forensics, covering key aspects such as data retrieval, analysis, and legal considerations. It addresses questions about computer forensics techniques, the purpose of forensic engagements, sources of data, characteristics of analysis, and benefits of data analysis. The solution also explores legal factors to consider before starting engagements, the tools used for data analysis, and the importance of the chain of custody. The document references sources like laptops, desktops, and the internet as data sources and highlights the use of data-mining software. The chain of custody form is described as a legal term outlining the handling of evidence. References to relevant books and journals are also included.

COMPUTER
CRIMES
CRIMES
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

MAIN BODY 3
1. Give short answers to the following questions 3
i. What is Computer Forensics? 3
ii. Why are computer forensic engagements and how they are carried out? 3
iii. Name some sources from which data can be retrieved 3
iv. Explain the characteristics of a computer forensic analysis 3
v. What are the benefits of data analysis? 3
What are the legal factors that should be considered before starting computer forensic
engagements? 4
What tools are used by forensic accounts for data analysis? 4
What is a chain of custody form? What type of information does this contain? 4
1. Give short answers to the following questions 3
i. What is Computer Forensics? 3
ii. Why are computer forensic engagements and how they are carried out? 3
iii. Name some sources from which data can be retrieved 3
iv. Explain the characteristics of a computer forensic analysis 3
v. What are the benefits of data analysis? 3
What are the legal factors that should be considered before starting computer forensic
engagements? 4
What tools are used by forensic accounts for data analysis? 4
What is a chain of custody form? What type of information does this contain? 4

MAIN BODY
1. Give short answers to the following questions
i. What is Computer Forensics?
Computer forensics are the technique that is being used for searching, preserving and
analysing over the information through computer system. This is done to find out evidence over
trial. Different techniques are used by the cybercrime officers to generate evidences over such
crimes. Many of the techniques detectives use in crime scene investigations have digital
counterparts, but there are also some unique aspects to computer investigations (Jovasevic,
2019).
ii. Why are computer forensic engagements and how they are carried out?
The purpose of computer forensics technique is required for making a search through
preservation and analysis of information of computer system to find out potential evidence for
trial. Lot of techniques is being utilized that is being used over the detectives to investigate crime
to mark out facts and evidences of case. Lot of other aspects is there within computer
investigation (Trujillo, 2019).
iii. Name some sources from which data can be retrieved
Data is one of the most important thing which is required to be collected through various
kinds’ sources and it is very important to be collected in terms of providing easiness in
jurisdiction related to cybercrime. Sources that is going to be used for finding of data are through
laptops, desktop, pen drive, mobile and internet. Other sources like credit or debit card. Identity
card and driving license can be used for generating of information.
iv. Explain the characteristics of a computer forensic analysis
Characteristics that is being present within analysis of such kind is verification,
validation, identification. Also documentation with collection of document is required.
v. What are the benefits of data analysis?
As the time is growing there are various kinds of benefits that is being hold by data
analysis that is it provides relevancy to the evidence to be presented, makes facts more clear
about fraud or harassment done. This is going to make a forensic computer analysis to be more
concrete in its terms. Benefits of it has been explained as follows:
The ability to reduce or even eliminate sampling risk – This is the biggest advantage of
forensic accountants over the external auditors.
The comparison of relevant types of data from different systems or sources to show a
more complete picture
1. Give short answers to the following questions
i. What is Computer Forensics?
Computer forensics are the technique that is being used for searching, preserving and
analysing over the information through computer system. This is done to find out evidence over
trial. Different techniques are used by the cybercrime officers to generate evidences over such
crimes. Many of the techniques detectives use in crime scene investigations have digital
counterparts, but there are also some unique aspects to computer investigations (Jovasevic,
2019).
ii. Why are computer forensic engagements and how they are carried out?
The purpose of computer forensics technique is required for making a search through
preservation and analysis of information of computer system to find out potential evidence for
trial. Lot of techniques is being utilized that is being used over the detectives to investigate crime
to mark out facts and evidences of case. Lot of other aspects is there within computer
investigation (Trujillo, 2019).
iii. Name some sources from which data can be retrieved
Data is one of the most important thing which is required to be collected through various
kinds’ sources and it is very important to be collected in terms of providing easiness in
jurisdiction related to cybercrime. Sources that is going to be used for finding of data are through
laptops, desktop, pen drive, mobile and internet. Other sources like credit or debit card. Identity
card and driving license can be used for generating of information.
iv. Explain the characteristics of a computer forensic analysis
Characteristics that is being present within analysis of such kind is verification,
validation, identification. Also documentation with collection of document is required.
v. What are the benefits of data analysis?
As the time is growing there are various kinds of benefits that is being hold by data
analysis that is it provides relevancy to the evidence to be presented, makes facts more clear
about fraud or harassment done. This is going to make a forensic computer analysis to be more
concrete in its terms. Benefits of it has been explained as follows:
The ability to reduce or even eliminate sampling risk – This is the biggest advantage of
forensic accountants over the external auditors.
The comparison of relevant types of data from different systems or sources to show a
more complete picture
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

The ability to easily trend relevant data over periods of time; fluctuations in trending lines
can be analyzed further for false positives and potential risk factors
What are the legal factors that should be considered before starting computer
forensic engagements?
Legal factors that is required to be taken into consideration before starting of forensic
engagement is that privacy should not be infringed without any valid reason, all the privacy of
data is going too maintained from hackers or other kind of vulnerability. Also internet should be
secured in a way that it can be used for official investigation only. Ethics should not be broken at
any cost. If it is not done in proper manner then people are going to lose confidence over the law
enforced and more complexity is going to be there that is going to increase difficulty and
efficiency.
It is considered to be one of the most significant legal issue in computer forensic is
admissibility of evidence in criminal case (Fehr, LiCalzi and Oates, 2016).
What tools are used by forensic accounts for data analysis?
One the most affective analytical tool over the forensic accounts is data-mining software
that is going to take extremely large data sets with extra pattern. Lot of commercials is available
over maintaining of data-mining software that has been taken over and extremely large sets of
data is extracted in the form of pattern.A lot of commercially available data-mining software
incorporates Benford's Law into the programming, which makes it very easy to spot irregularities
in those patterns.
What is a chain of custody form? What type of information does this contain?
Chain custody is a legal term that is being used upon referring in order and manner under
which physical or electronic evidence is being presented in criminal or civil case. In Computer
forensic of criminal nature prosecution is required to prove all evidence has been handled with
an unbroken chain of custody. It contains that kind of information that is helpful in getting valid
evidence through electronic means (Baturin, 2017).
can be analyzed further for false positives and potential risk factors
What are the legal factors that should be considered before starting computer
forensic engagements?
Legal factors that is required to be taken into consideration before starting of forensic
engagement is that privacy should not be infringed without any valid reason, all the privacy of
data is going too maintained from hackers or other kind of vulnerability. Also internet should be
secured in a way that it can be used for official investigation only. Ethics should not be broken at
any cost. If it is not done in proper manner then people are going to lose confidence over the law
enforced and more complexity is going to be there that is going to increase difficulty and
efficiency.
It is considered to be one of the most significant legal issue in computer forensic is
admissibility of evidence in criminal case (Fehr, LiCalzi and Oates, 2016).
What tools are used by forensic accounts for data analysis?
One the most affective analytical tool over the forensic accounts is data-mining software
that is going to take extremely large data sets with extra pattern. Lot of commercials is available
over maintaining of data-mining software that has been taken over and extremely large sets of
data is extracted in the form of pattern.A lot of commercially available data-mining software
incorporates Benford's Law into the programming, which makes it very easy to spot irregularities
in those patterns.
What is a chain of custody form? What type of information does this contain?
Chain custody is a legal term that is being used upon referring in order and manner under
which physical or electronic evidence is being presented in criminal or civil case. In Computer
forensic of criminal nature prosecution is required to prove all evidence has been handled with
an unbroken chain of custody. It contains that kind of information that is helpful in getting valid
evidence through electronic means (Baturin, 2017).
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

REFRENCES
Books and journals
Baturin, Y., 2017, September. Computer Crimes, Computer Security and Computer Law:
Phenomenon’s Dynamics Notes from the Russian Chair of Computer Law. In 2017
International Workshop on Engineering Technologies and Computer Science (EnT) (pp.
3-7). IEEE.
Fehr, C., LiCalzi, C. and Oates, T., 2016. Computer crimes. Am. Crim. L. Rev. 53. p.977.
Jovasevic, D., 2019. Computer Crimes in Republic of Serbia. JE-Eur. Crim. L. p.159.
Trujillo, M., 2019. Computer Crimes. Am. Crim. L. Rev. 56. p.615.
Books and journals
Baturin, Y., 2017, September. Computer Crimes, Computer Security and Computer Law:
Phenomenon’s Dynamics Notes from the Russian Chair of Computer Law. In 2017
International Workshop on Engineering Technologies and Computer Science (EnT) (pp.
3-7). IEEE.
Fehr, C., LiCalzi, C. and Oates, T., 2016. Computer crimes. Am. Crim. L. Rev. 53. p.977.
Jovasevic, D., 2019. Computer Crimes in Republic of Serbia. JE-Eur. Crim. L. p.159.
Trujillo, M., 2019. Computer Crimes. Am. Crim. L. Rev. 56. p.615.
1 out of 5
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.