Question: After reading the lecture notes answer the following questions. 1. List the benefits of computer forensics to Law Enforcement and the public, ] 2. List

After reading the lecture notes answer the
After reading the lecture notes answer the
After reading the lecture notes answer the
After reading the lecture notes answer the following questions. 1. List the benefits of computer forensics to Law Enforcement and the public, ] 2. List the software used in computer investigations. 3. Discuss the challenges Law Enforcement experiences in conducting computer investigations. I. Emergence of Computer Forensics . Introduction of computer technology has created a new wave of illegitimate behavior and skilled criminals Prompted Law Enforcement (LE) profession to create computer forensic techniques which accomplish the following goals: Enables LE to protect privileged information, maintain the integrity of potential evidence and ensures timely processing of evidence Establishes procedures for the recovery, preservation and analysis of digital evidence Private Sector Benefits: Corporations: obtain evidence relating to sexual harassment, embezzlement, theft or misappropriation of trade secrets- confidential information . Individuals: support of claims of wrongful termination, sexual harassment or age discrimination Civil Litigators: personal and business records which relate to fraud, divorce, discrimination and harassment II. Law Enforcement Challenges in Computer Investigations Cyberphobia: fear of new technology by LE Lack of financial resources to procure forensic software and training of personnel Lack of communication and cooperation among LE agencies Over-reliance on automated programs and self-proclaimed Experts . Low frequency of reporting computer-related crime by individuals and corporations due to lack of confidence in LE Evidence corruption: failure to follow the three major rules in handling computer evidence: Always work from an image, leaving the original intact Always document Maintain the chain of custody III. Software Used in Computer Investigations Data preservation, duplication and verification tools . Data recovery/extraction tools Data analysis tools Data reporting tools Network utilities

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related General Management Questions!