Sunday, June 23, 2019

Assess at least four different sources of data that could be used in a Research Paper

Assess at least four different sources of data that could be used in a digital forensic investigating - Research Paper ExampleIn addition, discussion depart also be helpful for network administrators in understanding different aspects of computer forensics, which will help them in ensuring greater security of their organizations strategically. Before assessing the topic, it is very essential to understand the definition of digital forensics that has been under the transition of acquiring recognition collectable to dearth of research in the area and due to lack of awareness about importance of digital forensics in todays competitive world. Briefly, forensics is the process in which experts utilize scientific means and skills to collect and analyze evidence that then fanny be submitted in the court for legal purpose (Kent, Chevaller, Grance, & Dang, 2006). In this regard, digital forensics is a newly-born discipline that is gradually acquiring its importance as a formal area of po stulate that deals with scientific knowledge in entreaty of evidence from different sources of data related to computers that involve desktops, laptops, routers, CCTV, network hubs, logs, software, time packages, emails, etc (ENFSI, 2003). It is very imperative to understand that since digital forensics is a new area of study that is still under the process of standardization, therefore, discussion in this paper related to different sources of data might not be the final word. Thus, it will let further study and investigation to reach to a conclusion in terms of prioritizing these sources in terms of their utilization in different events/incidents. In addition, from a technical perspective, it is also essential to understand that besides assessing different sources of data, it is equally important to ensure fulfillment of primary goal of digital forensics that is about saving of the identified data source. It has been an observation that investigators usually are able to identify important data sources however, they overlook preservation of the sources that results in unacceptable of evidence in the court. SOURCES OF DATA As mentioned earlier, digital forensic investigation has been divided into different stages of preservation, collection, examination, and analysis (ENFSI, 2003). Collection stage is relevant in this paper as it involves acknowledgment and collection of information pertinent to the case under investigation. In case of usual forensics, everything is a source since investigators are able to gather information from pile and acquire fingerprints from clothes, furniture, floors, etc. However, when it comes to digital forensics, information is usually available in computers of computerized equipments, such as phone logs, web traffic, packet sniffers, network records, etc (ENFSI, 2003), and therefore, it is usually not possible to take away the whole equipment, and investigators have to collect the information while ensuring complete preservatio n. In digital forensics, besides four stages, one can categorize the stage of collection in two parts. Firstly, investigators collect background evidence that refers to the data that is usually available and stored for usual organizational purposes (Sheldon, 2002). On the opposite hand, investigators also come across

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.