StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Computer Forensics Challenges - Essay Example

Cite this document
Summary
The paper "Computer Forensics Challenges" discusses that an investigator might consider using an antistatic pad with an attached wrist strap as well. Both help prevent damage to computer evidence. Computer components require specific temperature and humidity ranges also…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.5% of users find it useful
Computer Forensics Challenges
Read Text Preview

Extract of sample "Computer Forensics Challenges"

Download file to see previous pages

The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched and the persons or things to be seized [11]. The Fourth Amendment is part of the Bill of Rights which guards against unreasonable searches and seizures. It was ratified as a response to the abuse of the writ of assistance which was a type of general search warrant in the American Revolution.

It specified that any warrant must be judicially sanctioned for a search or an arrest for such a warrant to be considered reasonable. Warrants must be supported by probable cause and be limited in scope according to specific information supplied by a person. It only applies to governmental actors and criminal law [3]. An example would be if a warrant is issued for child porn on an individual’s computer, but finds records of embezzlement, the embezzlement records could not be used in a court of law.

The exception is if the police could justify obtaining a warrant to search the computer for records of embezzlement. The Fourth Amendment interposes a magistrate as an impartial arbiter between the defendant and the police. The magistrate may issue a search warrant if the magistrate or judge is convinced that probable cause exists to support a belief that evidence of a crime is located at the premises. The officer must prepare an affidavit that describes the basis for probable cause and the affidavit must limit the area to be searched and evidence searched for.

The warrant thus gives the police only a limited right to violate a citizen’s privacy. If the police exceed that limited right, or if a warrant is required, but the police have not first obtained one, then any evidence seized must be suppressed (U.S. Department of Justice 2002). The issue of suppression driven by a determination of whether the Fourth Amendment has been correctly followed by the police is often the determining factor in criminal cases.

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Computer Forensic Essay Example | Topics and Well Written Essays - 9000 words”, n.d.)
Computer Forensic Essay Example | Topics and Well Written Essays - 9000 words. Retrieved from https://studentshare.org/miscellaneous/1558966-computer-forensic
(Computer Forensic Essay Example | Topics and Well Written Essays - 9000 Words)
Computer Forensic Essay Example | Topics and Well Written Essays - 9000 Words. https://studentshare.org/miscellaneous/1558966-computer-forensic.
“Computer Forensic Essay Example | Topics and Well Written Essays - 9000 Words”, n.d. https://studentshare.org/miscellaneous/1558966-computer-forensic.
  • Cited: 0 times

CHECK THESE SAMPLES OF Computer Forensics Challenges

Computer Forensics

This article takes a critical analysis of computer forensics as a way of presenting evidence in courts on matters pertaining to computer crimes.... The paper focuses on the importance of computer forensics in collecting, interpreting and presenting evidence relating to cyberspace crimes.... The intention of this study is computer forensics as a way of searching and analyzing data stored in computers and other electronic media.... computer forensics aims at forensically examining digital data in order to present facts and opinions concerning the information gained....
11 Pages (2750 words) Research Paper

The Challenges of the Forensic Recovery and Examination of Data from Mobile Devices

This research proposal "The challenges of the Forensic Recovery and Examination of Data from Mobile Devices" discusses mobile device forensics as a dynamic field.... There are challenges and opportunities faced by investigators in their effort of analysing mobile devices.... This remarkable development of mobile technology is the origin of current security challenges.... This paper summarizes the challenges faced in forensic recovery and examination of data from mobile devices....
14 Pages (3500 words) Research Proposal

Digital Forensic Investigation

This discussion will be helpful for network administrators in understanding different aspects of computer forensics, which will help them in ensuring greater security of their organizations strategically.... In order to understand this data source, the paper will include a description of two methods that are used to access the data source that will make it easier to understand the challenges that investigators confront while collecting information from it.... This paper "Digital Forensic Investigation" discusses sources of data used during the investigation of digital forensics in an effective and legal way, and prioritize discussed data sources according to three different events of network intrusion, malware installation, and insider file detection....
8 Pages (2000 words) Case Study

The Latest from Computer Forensics

The essay "The Latest from computer forensics" focuses on the critical analysis and discussion by enumerating applicable laws and notable contributions of computer forensics.... In particular, we shall take a look at the developments happening in the field of computer forensics and how law-enforcement agencies are capitalizing on these.... We should look to our law-enforcing agencies for their use of computer forensics.... computer forensics is similar to the regular forensics procedures done by law enforcers, such as those seen in CSI....
7 Pages (1750 words) Essay

Role of Computer Forensics and Investigation Report in Criminology

From the paper "Role of computer forensics and Investigation Report in Criminology" it is clear that whole Disk Encryption is a process in which full contents of a hard drive are converted into unique codes.... he physical drive is another commonly used term in computer forensics.... As such, it is possible to collect information concerning deleted files in a computer system hence the relevance of slack space in digital forensics.... Decryption is only achieved by individuals with authorized access into the computer software....
5 Pages (1250 words) Research Paper

Digital Evidence: Understanding The Process and Challenges

This paper outlines computer forensics, the lifecycle of computer crimes, digital information, juridical and legal issues, problems and safety.... This assignment describes Digital Evidence: Understanding the Process and challenges.... This paper deals with the processes and challenges involved in identifying, recovering, securing, examining, analyzing and preparing digital evidence from a crime scene.... omputer forensics is a comparatively new branch of the crime investigational system and involves collecting digital evidence from the crime scene by the analysis of the computers systems, networks, and servers in addition to numerous other digital devices (Sahu, 2008, p....
13 Pages (3250 words) Assignment

Mobile Forensics: Mobile Phones Handsets, SATNA V, PDA, USB

lot of evidential and technical challenges have existed due particularly on the use of mobile phones which has been a threat to the security.... n trial to cub and manage these challenges, several tools exist to extract evidence from mobile devices but it is true that no one tool or method can manage to acquire all the evidence from all devices.... The project 'Mobile forensics: Mobile Phones Handsets, SATNAV, PDA, USB' is aimed at creating awareness among the public on the importance of studying mobile forensics....
8 Pages (2000 words) Assignment

Challenges in Mobile Forensic Technologies

From the paper "challenges in Mobile Forensic Technologies" it is clear that mobile forensic investigators face elevated expenses in training processes and as they seek to acquire different tools for use in the examination process.... Another aspect of these challenges is the difficulty in connections.... These differences bring about technical difficulties in mobile forensics.... The last challenge with mobile forensics is that there is not one specific software tools that are used in data extraction....
5 Pages (1250 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us