Computer Forensics Research Paper

565 Words3 Pages
Unit 2 Assignment 1: Examine Computer Forensics and Privacy Computer forensics involves the preservation. Identification, extraction, and documentation and interpretation of computer data. The three main steps in computer forensic investigation are acquiring, authenticating, and analyzing of the data. Data recovery is only one aspect of the forensics investigation. Tracking the hacking activities within a compromised system is also important. With any system that is connected to the internet, hacker attacks are as certain as death and taxes. Each time any kind of input is fed into the computer, whether it is a key pressed on your keyboard, or a click on the mouse, a signal is generated and sent to the appropriate computer application and…show more content…
Computer forensics is essentially a means for gathering electronic evidence during an investigation. In order to use this information to prosecute a criminal act and to avoid suppression during trial, evidence must be collected carefully and legally. It is particularly important to be aware of the privacy rights of suspects, victims and uninvolved third parties. An investigator needs to have knowledge of several laws and statutes that govern electronic evidence collection including the fourth amendment of the constitution, also known as the wiretap statute, the Electronic Communications Privacy Act (ECPA) the USA Patriot Act. Each of these items affects the legality of electronic evidence and the appropriate procedures to acquire the evidence. Computer forensics investigations typically involve one of two privacy issues. The first occurs when evidence is retrieved a particular computer or electronic device. In this case the investing officers need to be careful to avoid charges of illegal search and seizure. In other words, they need to comply with the Fourth Amendment to the Constitution. The second issue involves evidence pertaining to Internet

More about Computer Forensics Research Paper

Open Document