Search icone
Search and publish your papers
Our Guarantee
We guarantee quality.
Find out more!

Computer Forensics Laboratory and Computer Investigations Training

Or download with : a doc exchange

About the author

General public
business law
Moi University

About the document

Published date
documents in English
case study
10 pages
General public
0 times
Validated by
0 Comment
Rate this document
  1. Introduction
  2. Problem Statement
  3. Literature Review
  4. Methodology
  5. Results and Analysis
  6. Discussion
  7. Conclusion

Computer forensics refers to the use of a computer expert program to collect, interpret, preserve, analyze and produce data from either volatile or non-volatile media storage devices. It is a branch of digital forensic science that is related to examining digital media in a forensic manner with the main aim of identifying, analyzing and recovering data that is necessary for investigations. People involved in computer forensics activities methodically examine computer media storage devices for purposes of finding evidence linked to cyber crime. Despite the perceived notion that computer forensics is commonly used for investigative purposes, it has also been used in civil case proceedings and litigation cases to recover data that is crucial for criminal case proceedings (Caloyannides, 2004).

The growth of computer forensics can mostly be attributed to the increasing number of people who own personal computers and have Internet access as well as the growing number of organizations in the world that have embraced information technology systems. The easy accessibility that individuals have to acquiring personal computers and the growth of the Internet as a way of life has seen cyber crimes such as hacking, fraud and cyber-stalking increasing in magnitude. Cyber crime in its current form today has become very sophisticated as most attacks on computer programs overlook the firewalls and detection systems that have been put in place to detect and prevent cyber crime (Meyers & Rogers, 2004).

[...] The introduction of the response team and the special courts contributed greatly to the government's effort of reducing cybercrime in the country. The presence of cyber crime units in police departments has also played a great part in prosecuting criminals found to have committed computer fraud and cyber hacking. The special cyber crime courts have led to the creation of anti-cyber crime departments that will be able to support the activities of the court. While this is a notable achievement, the United Arab Emirates Armed Forces have been left behind by this effort to contain cyber crimes in the country (First Information Security, 2011). [...]

[...] Computer Forensics Laboratory and Computer Investigations Training Computer Forensics and Computer Investigations: Outline I. Introduction A. This will be a brief introduction of the topic that is understudy II. Problem Statement A. A statement and definition of the research's problem will be assessed in this section of the research III. Literature Review A. The various forms of literature that have dealt with the topic will be reviewed and discussed in this assessment IV. Methodology A. [...]

[...] The sample population was evaluated on what they thought about computer forensics and investigation and whether these concepts were important in the military. The information collected from the respondents was analyzed through the use of descriptive analysis to determine whether there is a need to provide military officers with computer forensic and investigative training. The collected information was grouped into ten high order categories which included availability of computer forensic tools in the military, military knowledge of forensic theories and research, education and training on computer forensic, data acquisition, encryption services, legal justice system in the UAE, government funding for computer forensic laboratory training, computer forensic technology and evidence correlation with regards to cyber crimes. [...]

[...] According to a study conducted by Whitcomb (2002), the use of computer forensics had basically been the focus of most efforts directed towards computer forensics training. Many forensic laboratories have concentrated on acquiring the latest technological innovations which can be used to analyze and interpret evidence that is linked to cyber crimes instead of focusing on the theoretical underpinnings that can be used to handle this type of technology. Based on the results of this study, theoretical research is ranked at a lower frequency when compared to computer forensic tools which means that the UAE government and the military do not place a lot of emphasis on the theoretical underpinnings that make up computer forensics and investigation procedures. [...]

[...] Examples of copyright and trademark related offences include illegal file sharing and trademark violations. Computer related offences are those that involve the use of a computer to commit cyber crimes. Offences that fall under computer related cyber crimes include computer fraud, phishing attacks, forgery, identity theft and misuse of devices that are connected to computer networks (Gordon & Ford, 2006). The above mentioned cyber crimes present a major challenge for many organizations that have become more Internet based. Many companies, businesses and military establishments around the world handle confidential data that is not meant for the public's view. [...]

Top sold for educational studies

Building Medtronic Globally By Omar Ishrak

 Social studies   |  Educational studies   |  Case study   |  09/12/2014   |   .pdf   |   4 pages

The impact of the marketing environment: Greggs

 Social studies   |  Educational studies   |  Case study   |  07/06/2015   |   .doc   |   8 pages

Most rated for educational studies

The Metaphysics of Photography

 Social studies   |  Educational studies   |  Case study   |  12/05/2013   |   .doc   |   6 pages