ISSC 351 discussion response

Anonymous

Question Description

Continue to follow your classmates' posts throughout the week and post at least one follow-up post to a classmate (minimum of 100 words) by 11:55 p.m. Eastern Time on Sunday. Your follow-up post can add additional insight to a classmate's opinions or can challenge their opinions. Use examples from the readings, or from your own research, to support your views, as appropriate. Be sure to read the replies to your own posts throughout the remainder of the week and reply to any questions or requests for clarification from your classmates and your professor. Your word count will be based only on your own words and not on any quoted material from the post you are replying to or from any other sources.


Questions:

1. What is computer forensics and how does it differ from other types of forensic science?

2. Compare & contrast public (criminal) investigations and private (corporate) investigations. Please give case examples for comparison.

Comment on at least two other peer student posts.

Complete this forum thread by Sunday of Week 1.


Student 1:

Regina,

When it comes to forensics it is known that this can include computer forensics. It is relatively newer compared to some of the others yet it has continued to be some of the most utilized evidence that is used during a criminal case. Computer forensics is the gathering of data in a very consistent and scientific way that can be utilized in a criminal investigation. Computer can be a broad term that can also mean any electronic device. Even though computer forensics is lumped in with other types of evidence such as DNA and fingerprint evidence it has to be understood that evidence that is collected during the computer forensics investigation would all be digital information. It is also known that this information could be “magnetically stored or encoded”. The most known devices that can be utilized in this event are ones such as laptop computer, smartphones, or printers (Easttom, 2014).

Criminal investigations that utilize computer forensics tend to deal with finding certain data that pertains to a criminal case such as ones of fraud, homicide, or drug trafficking. Corporations can also use digital forensics in order to find evidence of fraud or embezzlement. They can see who used a computer or electronic device at a certain time and what data they might have changed or altered (Easttom, 2014). Often time’s corporations do not bring in criminal investigators if they do not see a blatant crime that was committed yet should they find evidence of sexual harassment or network intrusions, prosecutors will be called in to take the appropriate actions.

Easttom, C. System Forensics, Investigation, and Response PDF VitalBook. [VitalSource]. Retrieved from https://online.vitalsource.com/#/books/9781284038330/.

Tutor Answer

Dr_PaulSharp
School: UT Austin

Running head: COMPUTER FORENSICS

Computer Forensics
Name
Institution
Date

1

COMPUTER FORENSICS

2

1. What is computer forensics and how does it differ from other types of forensic science?
Computer forensics concerns the collection and accessing data that has been analyzed from the
computer so that it can be used as evidence. The process is possible with the application of a
scientific approach. Computer forensics started to differentiate with others after the white-collar
crimes registered an increase throughout the world. Unlike other forensics approaches which
look at the DNA and fingerprints, the data which is used in computer forensics is accessed from
storage media such as hard disks. The information is then analyzed, and it is used to help solve
white-collar jobs (Kruse II & Heiser, 2001). Through...

flag Report DMCA
Review

Anonymous
Excellent job

Similar Questions
Related Tags

Brown University





1271 Tutors

California Institute of Technology




2131 Tutors

Carnegie Mellon University




982 Tutors

Columbia University





1256 Tutors

Dartmouth University





2113 Tutors

Emory University





2279 Tutors

Harvard University





599 Tutors

Massachusetts Institute of Technology



2319 Tutors

New York University





1645 Tutors

Notre Dam University





1911 Tutors

Oklahoma University





2122 Tutors

Pennsylvania State University





932 Tutors

Princeton University





1211 Tutors

Stanford University





983 Tutors

University of California





1282 Tutors

Oxford University





123 Tutors

Yale University





2325 Tutors