Computer forensics refers to the use of a computer expert program to collect, interpret, preserve, analyze and produce data from either volatile or non-volatile media storage devices. It is a branch of digital forensic science that is related to examining digital media in a forensic manner with the main aim of identifying, analyzing and recovering data that is necessary for investigations. People involved in computer forensics activities methodically examine computer media storage devices for purposes of finding evidence linked to cyber crime. Despite the perceived notion that computer forensics is commonly used for investigative purposes, it has also been used in civil case proceedings and litigation cases to recover data that is crucial for criminal case proceedings (Caloyannides, 2004).
The growth of computer forensics can mostly be attributed to the increasing number of people who own personal computers and have Internet access as well as the growing number of organizations in the world that have embraced information technology systems. The easy accessibility that individuals have to acquiring personal computers and the growth of the Internet as a way of life has seen cyber crimes such as hacking, fraud and cyber-stalking increasing in magnitude. Cyber crime in its current form today has become very sophisticated as most attacks on computer programs overlook the firewalls and detection systems that have been put in place to detect and prevent cyber crime (Meyers & Rogers, 2004).
[...] The introduction of the response team and the special courts contributed greatly to the government's effort of reducing cybercrime in the country. The presence of cyber crime units in police departments has also played a great part in prosecuting criminals found to have committed computer fraud and cyber hacking. The special cyber crime courts have led to the creation of anti-cyber crime departments that will be able to support the activities of the court. While this is a notable achievement, the United Arab Emirates Armed Forces have been left behind by this effort to contain cyber crimes in the country (First Information Security, 2011). [...]
[...] Computer Forensics Laboratory and Computer Investigations Training Computer Forensics and Computer Investigations: Outline I. Introduction A. This will be a brief introduction of the topic that is understudy II. Problem Statement A. A statement and definition of the research's problem will be assessed in this section of the research III. Literature Review A. The various forms of literature that have dealt with the topic will be reviewed and discussed in this assessment IV. Methodology A. [...]
[...] The country however developed a law in 2006 (Federal Law No. of 2006 on the Prevention of Information Technology Crimes) that would deal with cyber crime attacks within the country's information systems. These laws were developed to respond to the increasing cases of hacking that were being done on the UAE government's networks (First Information Security, 2011). Apart from the law, the UAE government came up with a Computer Emergency Response Team in 2007 that would fight cybercrime in the country reducing the number of people exposed to phishing attacks and website defacement. [...]
[...] Computer forensics in this definition serves as a tool for correlating, interpreting and predicting any actions that might impact on military operations. Military efforts in combating cyber crime are also directed towards making digital data suitable and persuasive for use in a criminal investigative process. The military's role in cyber crime is therefore relegated to ensuring that cyber crimes are not committed against the military's information systems (Giordano & Maciag, 2002). While the westernized countries such as the United States, Europe and Australia have developed computer forensic programs for their military, the government of the United Arab Emirates has mostly taken on the role of ensuring that its citizens are not victims of cyber attacks. [...]
[...] Many military organizations around the world operate in a cloud of secrecy that exposes them to situations of hacking or illegal access to confidential information that pertains to the national security of the organization. Reducing the silo mentality will decrease cases of cyber attacks on confidential company information and also ensure that companies have positive communication channels that are meant to reduce information theft. Conclusion This study has dealt with identifying the need for computer forensic training and computer investigation for the UAE military. [...]
APA Style referenceFor your bibliography
Online readingwith our online reader
Content validatedby our reading committee