Wednesday, May 15, 2019
Assess at least four different sources of data that could be used in a Research Paper
Assess at least four contrastive sources of data that could be used in a digital forensic investigation - Research reputation ExampleIn addition, discussion will alike be helpful for network administrators in reasonableness different aspects of computer forensics, which will help them in ensuring greater security of their organizations strategically. Before assessing the topic, it is very congenital to chthonianstand the definition of digital forensics that has been under the process of acquiring recognition due to dearth of research in the area and due to lack of awareness about importance of digital forensics in forthwiths competitive world. Briefly, forensics is the process in which experts utilize scientific means and skills to collect and analyze essay that then can be submitted in the court for legal purpose (Kent, Chevaller, Grance, & Dang, 2006). In this regard, digital forensics is a newly-born discipline that is gradually acquiring its importance as a formal area o f study that deals with scientific knowledge in collection of evidence from different sources of data related to computers that involve desktops, laptops, routers, CCTV, network hubs, logs, software, m packages, emails, and so forth(ENFSI, 2003). It is very imperative to understand that since digital forensics is a new area of study that is still under the process of standardization, therefore, discussion in this paper related to different sources of data might not be the final word. Thus, it will take further study and investigation to reach to a conclusion in terms of prioritizing these sources in terms of their utilization in different events/incidents. In addition, from a technical perspective, it is also essential to understand that besides assessing different sources of data, it is equally important to ensure fulfillment of primary conclusion of digital forensics that is about preservation of the identified data source. It has been an observation that investigators publicly are able to signalize important data sources however, they overlook preservation of the sources that results in unacceptable of evidence in the court. SOURCES OF DATA As mentioned earlier, digital forensic investigation has been divided into different maps of preservation, collection, examination, and analysis (ENFSI, 2003). Collection stage is relevant in this paper as it involves identification and collection of info pertinent to the side under investigation. In case of usual forensics, everything is a source since investigators are able to gather information from people and acquire fingerprints from clothes, furniture, floors, etc. However, when it comes to digital forensics, information is usually available in computers of computerized equipments, such as phone logs, web traffic, software package sniffers, network records, etc (ENFSI, 2003), and therefore, it is usually not possible to take away the whole equipment, and investigators have to collect the information while e nsuring complete preservation. In digital forensics, besides four stages, one can categorize the stage of collection in two parts. Firstly, investigators collect background evidence that refers to the data that is usually available and stored for usual organizational purposes (Sheldon, 2002). On the other hand, investigators also come across
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment