Wednesday, January 1, 2020

Annotated Bibliography On Digital Forensic Investigations

Digital Forensic methods have to be continuously updated in order to effectively combat trends that enable users with intentions of destroying, concealing, altering and deleting digital evidence that can either link them to serious felonies or various computer crimes. Means for tampering with evidence involve the use of techniques that are classified as anti-forensics. Anti-forensics presents digital forensic investigators with several challenges, the greatest being connecting the perpetrator to a crime by identifying evidence of their use of it. If a perpetrator can properly conceal his/her tracks using anti-forensics then even if a digital forensic investigator can identify the use of anti-forensic tools on a system, they’d still have a daunting task ahead of them; proving what user used the tools and how it can be admissible as evidence in the court of law. These challenges have existed in the past, and exist even today as the field of digital forensics has to constantly e volve to keep up with its enemy, anti-forensics. However, experts are currently researching future ways to identify the presence of anti-forensics and some of the perpetrators are getting caught. In this study, a criminal case involving the use of anti-forensics will be introduced that sheds light on the purpose for the need of digital forensics to proactively face the challenges that are presented through the use of these techniques, and establish a basis for the convictions of cyber-criminals, orShow MoreRelatedHbr When Your Core Business Is Dying74686 Words   |  299 Pagesprofessionals can transform your firm’s document processes to create revenue while driving up productivity. Result? Improved top and bottom lines. There’s a new way to look at it. Organizations waste millions on managing the flow of documents from digital to paper and back again. Xerox Global Services professionals create efficiencies by streamlining those processes, upgrading document technologies and finding better ways for people and their resources to work together. For example, our document assessments

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.