issc 351 discussion response

Continue to follow your classmates’ posts throughout the week and post at least one follow-up post to a classmate (minimum of 100 words) by 11:55 p.m. Eastern Time on Sunday. Your follow-up post can add additional insight to a classmate’s opinions or can challenge their opinions. Use examples from the readings, or from your own research, to support your views, as appropriate. Be sure to read the replies to your own posts throughout the remainder of the week and reply to any questions or requests for clarification from your classmates and your professor. Your word count will be based only on your own words and not on any quoted material from the post you are replying to or from any other sources.

Questions:

1. What is computer forensics and how does it differ from other types of forensic science?

2. Compare & contrast public (criminal) investigations and private (corporate) investigations. Please give case examples for comparison.

Comment on at least two other peer student posts.

Complete this forum thread by Sunday of Week 1.

Student 1:

Regina,

When it comes to forensics it is known that this can include computer forensics. It is relatively newer compared to some of the others yet it has continued to be some of the most utilized evidence that is used during a criminal case. Computer forensics is the gathering of data in a very consistent and scientific way that can be utilized in a criminal investigation. Computer can be a broad term that can also mean any electronic device. Even though computer forensics is lumped in with other types of evidence such as DNA and fingerprint evidence it has to be understood that evidence that is collected during the computer forensics investigation would all be digital information. It is also known that this information could be “magnetically stored or encoded”. The most known devices that can be utilized in this event are ones such as laptop computer, smartphones, or printers (Easttom, 2014).

Criminal investigations that utilize computer forensics tend to deal with finding certain data that pertains to a criminal case such as ones of fraud, homicide, or drug trafficking. Corporations can also use digital forensics in order to find evidence of fraud or embezzlement. They can see who used a computer or electronic device at a certain time and what data they might have changed or altered (Easttom, 2014). Often time’s corporations do not bring in criminal investigators if they do not see a blatant crime that was committed yet should they find evidence of sexual harassment or network intrusions, prosecutors will be called in to take the appropriate actions.

Easttom, C. System Forensics, Investigation, and Response PDF VitalBook. [VitalSource]. Retrieved from https://online.vitalsource.com/#/books/9781284038330/.

 
Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!
Use Discount Code "Newclient" for a 15% Discount!

NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.