التسميات

الأحد، 28 يناير 2018

Important Notes On Computer Forensics Investigation

By Peter Gray


Computer forensic science deals with substantiation found in computers and other digital storage media. One of the major objective of computer criminology is to scrutinize media in a forensic way in order to ascertain, preserve, recover, analyze and present specifics about the evidence. The facts recovered from a given investigation are used in high profiled cases hence giving solid information therefore, this method is becoming widely used especially for cases associated with digital media. This piece consequently gives deeper understanding of the computer forensics investigation in this article.

Today, technology has increasingly become extremely integrated especially into individual lives, so much so that they expect to always have a very constant access to their individual mails, and also keep in constant touch with their social circle even during the working hours. This therefore means that organizations may be very susceptible to things like cyber-crime and other online-related frauds. Oftentimes, the organizations are usually much unprepared in dealing with such circumstances efficiently.

Simply put, this is the use of scientific knowledge to actively look for information on materials, such as computers, seized from a crime scene, and to prove, using this data, that some form of crime has been committed. It may sound simple enough but the process necessary to ensure integrity of digital information retrieved in criminal investigations for such a purpose as a court case is intricate and equally rigorous. Basic principles that are standard internationally must be therefore be adhered to.

Before any form of digital evidence can be collected, all procedures and policies must be followed. The investigators must obtain authority to take data into their possession without breaching any laws themselves. Once authorization is obtained, preparation of systems for retrieval of information should be made with thought put into where the data will be transferred and documentation of this done.

When incidents of cyber-security and other computer-related issues happen to an organization, the Information Technology or IT department is usually expected to make a premier assessment and evaluation, in a bid to try and articulately identify the particular nature, effect, extent, as well as the general seriousness of the scenario or incident. Oftentimes, the staff will not have initially received any form of computerized forensic training.

Volatile data can also be recovered whereby when collecting evidence the operating system is still active and any data stored in the RAM recovered before the machine shuts down may not be lost. If the data is lost then the live analysis method can be used to recover the data furthermore, there are specific tools used by the examiners to encrypt data from a locked computer and use it as evidence.

Data which may likely have been deleted may also be retrieved through procedures already decided on. Prior determination of sound forensic strategies and procedures promotes swift data recovery and storage of the evidence, and aids investigators to draw credible interpretation of the information acquired.

Finally, it is crystal clear that evidence reconstructed from an operating system is very important and not unless the computer was hacked then the information is considered legitimate. These evidences have been used by law enforcers and legal teams to solve many cases.




About the Author:



ليست هناك تعليقات:

إرسال تعليق