Description
1.Please cover all the topics mentioned in the pdf.
2. Please do not deviate from the main topic.
3. Include the number of articles as mentioned in the PDF.
Unformatted Attachment Preview
Purchase answer to see full attachment
Explanation & Answer
Attached is the complete assignment along its outline. Please feel free to ask for any corrections or clarification. Thank you
Surname 1
Outline
Title page-------------------------------------------------------------------------------------------------------1
Literature review----------------------------------------------------------------------------------------------2
References-----------------------------------------------------------------------------------------------------7
Surname 1
RUNNING HEAD: Unit 7 lab
Name
Course
Professor
February 20, 2019
Surname 2
RUNNING HEAD: Unit 7 lab
Computer forensics and crime: A literature review
Several countries, including the United States of America, have incorporated the use of
technology in the investigation of crimes. This decision has made it easier for the tracking down
of perpetrators and the prevention of any future computer breaches. The term computer forensic
is used to refer to the process of acquiring and evaluating digital information (Desail and
Nayarankar, 2015). It is divided into three major categories that help achieve these functions;
network forensics, data recovery and disaster recovery.
Desail and Nayarankar (2015) present the various challenges faced when carrying out
cybercrime investigations such as the virtual environment, the protection of data and the process
of acquiring data. Seven different case studies concerning digital crimes are presented along with
the appropriate tools that can be used for forensic analysis. The problem was well defined. The
problem-solving approach used was quite appropriate. Every case was analyzed individually.
Relevant literature was evaluated and incorporated into the article. The authors agree with the
supporting literature. Readers are able to understand the problem and the potential solutions
presented by the authors.
Another article by Evans et al, (2015) explores the various models used in the conduction
of forensic investigation then singles out on one; the integrated computer forensics investigation
process model. The authors acknowledge that there is no single fixed way of approaching such
investigations. The problem was well defined and approached appropriately. Various literary
works have been i...