The past thirty (30) years has of technological advancement has also seen the importance of computer forensics specialists. Computer forensics as a field in investigations concerns the acquisition and analysis of computer-based information to be use as evidences in various investigative procedures. Computer forensics specialist ha the basic task of satisfying these. Specifically, a computer forensics expert basic task is to provide a way of to preserve, identify, extract and document computer-based evidences. Their jobs also include searching of available information on computers that can provide leads and help to detectives build cases. This specific task often requires them to recover deleted files and emails. Aside from accumulation of evidences to support legal cases, they are also programmers. They make programs that they can use in recovering lost or deleted files and other computer-based evidences. Because they are experts and have a hold on various evidences, they are also called for expert evidences when during trials. (BCIT, 2013)
In summary, a computer forensic expert serves two roles. That is to help educate people in court by proving expert testimonies and presentation or summarizing facts through numerous reports. The other role is as a “vendor” of services. This means that he can open a business that provides a range of services like consulting and project management related services.
The process of investigation involves securing the computer systems where data is to be collected to ensure that no unauthorized user will get hold of the equipment. After securing the system, all files, that is including encrypted files, hidden or deleted must be retrieved and copied. It is important that the specialist works on copies of these files to preserve the original as sometimes the simple act of accessing file can cause alterations. Everything must be recovered, deleted files should be restored while encrypted files must be revealed and decrypted. The specialist must also analyze computer storage including unallocated disk spaces. It is important that every step is documented and all findings are put together in a report. a
As technology has become more and more complicated, the challenges of a computer forensic expert became more complicated too. Networking is one challenge for an expert. He may start investigation in an office in the US but may end up with investigating twenty (20) more offices and twenty (20) different countries. Aside from the physical challenge this one brings, questions of jurisdiction may also prevent or cause distractions in the investigation process. Legal hurdles are another challenge. This is when a company investigated presents counter charges that may put a halt to investigation processes. Storage media and technological advances are other challenges. Because of the constant technological advances, computer forensics experts must be able to keep up with the technological gadget to be able to conduct investigations properly. This includes coming up for example with some technological devices that could detect the small storage mediums that are being used today. (Jones, 2013)
Provide an overview of how computing devices are used in crimes of today and how these crimes can affect a company's data and information.
The use of computing devices in crimes is generally termed as computer crimes. Generally, a computer crime is any crime committed which involves the use of computers or the internet. Computer crimes are categorized by the US Department of Justice as those crimes involving the illegal possession of computer peripherals, hardware and software; those crimes that targets directly the computer devices or networks like viruses, hacking, spywares or malwares; and the crimes that do not directly target the hardware or software but still uses computer networks and computer devices to achieve such intentions which includes child pornography, corporate espionage, phishing, cyber terrorism or other crimes. (HG.org, 2013)
There have been several instances where cybercrimes have proven that that are capable of affecting a company’s operations. In a study conducted by Ponemon Institute, the cost of computer crimes is the US for the year 2012 was estimated to be around $9 million dollars among the 199 companies they surveyed. The most common of the crimes have been information theft. Information theft can greatly affect a company’s data and operations as their company data can be altered or sometimes they are prohibited access to their data. Sometimes, their client’s data are affected as well. This in turn results to disruption of normal operations of the company. Security measures need to be well in placed to detect these.
Discuss how computer forensics investigations pertain to the law and trying of cases.
Results of computer forensics investigations are accepted by law as evidences in trying of cases. Usually, the forensic investigator testifies in court in the category of an expert testimony. Evidences presented by a computer forensic expert based on the results of their investigations follow the guidelines and practices for accepting digital evidences inside court trials. Although, the results conducted are considered legal, sometime courts attacks the presentation of such due to the fact that these are obtained without permission and because of the ease of altering these, questions regarding authenticity usually comes out.
Explain how you could assist in investigating the potential ongoing sexual harassment complaints and determine how you would communicate this to the Board of Directors.
References:
BCIT (2013). Forensic Investigation: Computer Crime Option. Retrieved from http://www.bcit.ca/study/programs/845cbtech
HG.org (2013). Computer Crime Law. Retrieved from http://www.hg.org/computer-crime.html
Jones, Paul (2013). Computer Forensics Specialist Challenges. Retrieved from http://www.ehow.com/about_6706394_computer-forensic-specialist-challenges.html
Shinder, Deb (2010). So you want to be a computer forensics expert. Retrieved from http://www.techrepublic.com/blog/security/so-you-want-to-be-a-computer-forensics-expert/4866