Monday, November 4, 2019

Assess at least four different sources of data that could be used in a Research Paper

Assess at least four different sources of data that could be used in a digital forensic investigation - Research Paper Example In addition, discussion will also be helpful for network administrators in understanding different aspects of computer forensics, which will help them in ensuring greater security of their organizations strategically. Before assessing the topic, it is very essential to understand the definition of digital forensics that has been under the process of acquiring recognition due to dearth of research in the area and due to lack of awareness about importance of digital forensics in today’s competitive world. Briefly, forensics is the process in which experts utilize scientific means and skills to collect and analyze evidence that then can be submitted in the court for legal purpose (Kent, Chevaller, Grance, & Dang, 2006). In this regard, digital forensics is a newly-born discipline that is gradually acquiring its importance as a formal area of study that deals with scientific knowledge in collection of evidence from different sources of data related to computers that involve deskto ps, laptops, routers, CCTV, network hubs, logs, software, time packages, emails, etc (ENFSI, 2003). It is very imperative to understand that since digital forensics is a new area of study that is still under the process of standardization, therefore, discussion in this paper related to different sources of data might not be the final word. Thus, it will take further study and investigation to reach to a conclusion in terms of prioritizing these sources in terms of their utilization in different events/incidents. In addition, from a technical perspective, it is also essential to understand that besides assessing different sources of data, it is equally important to ensure fulfillment of primary goal of digital forensics that is about preservation of the identified data source. It has been an observation that investigators usually are able to identify important data sources; however, they overlook preservation of the sources that results in unacceptable of evidence in the court. SOURC ES OF DATA As mentioned earlier, digital forensic investigation has been divided into different stages of preservation, collection, examination, and analysis (ENFSI, 2003). Collection stage is relevant in this paper as it involves identification and collection of information pertinent to the case under investigation. In case of usual forensics, everything is a source since investigators are able to gather information from people and acquire fingerprints from clothes, furniture, floors, etc. However, when it comes to digital forensics, information is usually available in computers of computerized equipments, such as phone logs, web traffic, packet sniffers, network records, etc (ENFSI, 2003), and therefore, it is usually not possible to take away the whole equipment, and investigators have to collect the information while ensuring complete preservation. In digital forensics, besides four stages, one can categorize the stage of collection in two parts. Firstly, investigators collect b ackground evidence that refers to the data that is usually available and stored for usual organizational purposes (Sheldon, 2002). On the other hand, investigators also come across

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.