ipl-logo

Computer Forensics Research Paper

742 Words3 Pages

Computer Forensics Computer forensics according to Rouse (2013), “Computer forensics is the application of investigation and analysis techniques to gather and preserve evidence from a particular computing device in a way that suitable for presentation in a court of law.” A computer forensics investigators serve as a detective for cyber-attacks and other malicious activity originating from a computer system, which disrupt the integrity, availability, reliability and confidentiality of information systems or mobile devices. (Forensic Science, n.d.) However, computer forensics face several legal issues related to the privacy and authenticity of information, limited knowledge of subject by practitioners, knowledge of the law, and access of computing systems. (Rouse, 2013) First issue, computer forensics investigator must prove the authenticity of the gathered data for admissibility into court, as electronic data is easily changeable, so proving chain of custody is a crucial element. Privacy, when retrieving or gathering data computer forensics personnel may gain access to documents or files deemed privileged, and are inadmissible due to legality. (Wegman, n.d.) Computer …show more content…

Firstly, computer forensics and traditional forensics priority are the gathering, preserving, and the documentation of evidence gathered, but the types of evidence differ. (Information Security and Forensics Society, 2004) As computer forensic specialist gathered evidence from digital devices in electronic form, traditional forensic personnel gather physical evidence such as DNA, blood samples, and hair. No single traditional or computer forensics investigator performs the task along, with both fields working with numerous personnel with variating professional specialties. (Information Security and Forensics Society,

More about Computer Forensics Research Paper

Open Document