ISSC 351 discussion response


Question Description

Continue to follow your classmates' posts throughout the week and post at least one follow-up post to a classmate (minimum of 100 words) by 11:55 p.m. Eastern Time on Sunday. Your follow-up post can add additional insight to a classmate's opinions or can challenge their opinions. Use examples from the readings, or from your own research, to support your views, as appropriate. Be sure to read the replies to your own posts throughout the remainder of the week and reply to any questions or requests for clarification from your classmates and your professor. Your word count will be based only on your own words and not on any quoted material from the post you are replying to or from any other sources.


1. What is computer forensics and how does it differ from other types of forensic science?

2. Compare & contrast public (criminal) investigations and private (corporate) investigations. Please give case examples for comparison.

Comment on at least two other peer student posts.

Complete this forum thread by Sunday of Week 1.

Student 1:


When it comes to forensics it is known that this can include computer forensics. It is relatively newer compared to some of the others yet it has continued to be some of the most utilized evidence that is used during a criminal case. Computer forensics is the gathering of data in a very consistent and scientific way that can be utilized in a criminal investigation. Computer can be a broad term that can also mean any electronic device. Even though computer forensics is lumped in with other types of evidence such as DNA and fingerprint evidence it has to be understood that evidence that is collected during the computer forensics investigation would all be digital information. It is also known that this information could be “magnetically stored or encoded”. The most known devices that can be utilized in this event are ones such as laptop computer, smartphones, or printers (Easttom, 2014).

Criminal investigations that utilize computer forensics tend to deal with finding certain data that pertains to a criminal case such as ones of fraud, homicide, or drug trafficking. Corporations can also use digital forensics in order to find evidence of fraud or embezzlement. They can see who used a computer or electronic device at a certain time and what data they might have changed or altered (Easttom, 2014). Often time’s corporations do not bring in criminal investigators if they do not see a blatant crime that was committed yet should they find evidence of sexual harassment or network intrusions, prosecutors will be called in to take the appropriate actions.

Easttom, C. System Forensics, Investigation, and Response PDF VitalBook. [VitalSource]. Retrieved from

Tutor Answer

School: UT Austin


Computer Forensics




1. What is computer forensics and how does it differ from other types of forensic science?
Computer forensics concerns the collection and accessing data that has been analyzed from the
computer so that it can be used as evidence. The process is possible with the application of a
scientific approach. Computer forensics started to differentiate with others after the white-collar
crimes registered an increase throughout the world. Unlike other forensics approaches which
look at the DNA and fingerprints, the data which is used in computer forensics is accessed from
storage media such as hard disks. The information is then analyzed, and it is used to help solve
white-collar jobs (Kruse II & Heiser, 2001). Through...

flag Report DMCA

Excellent job

Similar Questions
Related Tags

Brown University

1271 Tutors

California Institute of Technology

2131 Tutors

Carnegie Mellon University

982 Tutors

Columbia University

1256 Tutors

Dartmouth University

2113 Tutors

Emory University

2279 Tutors

Harvard University

599 Tutors

Massachusetts Institute of Technology

2319 Tutors

New York University

1645 Tutors

Notre Dam University

1911 Tutors

Oklahoma University

2122 Tutors

Pennsylvania State University

932 Tutors

Princeton University

1211 Tutors

Stanford University

983 Tutors

University of California

1282 Tutors

Oxford University

123 Tutors

Yale University

2325 Tutors