Forensics Project Report

Read Complete Research Material

FORENSICS PROJECT REPORT

Forensics Project Report

Abstract

Computers have permeated almost every aspect of modern life. Their benefits are innumerable. Computers have automated manufacturing processes, sped delivery of goods, enhanced shopping options, made cross-planetary communications virtually instant, and even saved lives through online sharing of medical information. Information is much more easily accessible than in the not-so-distant past and has reduced research time and travel immensely. Unfortunately, criminals have benefited from technological advancements in computing. Computers have made it much easier to steal trade secrets from companies and have even caused grave threats to national security. Since global communications are controlled by computers, they can also be disrupted by computers.

Table of Contents

Abstract2

Introduction4

Case of an Organization4

Why Computer Forensics?5

The Forensic Process6

Modern Computer Forensics - Modern Computer Crime7

Conclusion9

References10

Glossary11

Acknowledgement12

Forensics Project Report

Introduction

Computers can also be used in civil disputes. A woman divorcing her husband for his infidelities may have proof of his relationships from their home computer. A company being sued for wrongful termination by a former employee may base their defense on the employee's misuse of their computer systems. A person being sued by the Recording Industry Association of America (R.I.A.A.) may be able to verify his or her claims of innocence by the information stored on their computer. There is a common thread binding these scenarios together: the ability to extract digital information from computer media and the ability to present it in a useful form in a court of law. This method of investigation is known as computer forensics.

Case of an Organization

Deluxe Corporation, a fictitious small scale enterprise, deals with online selling of consumer electronic goods. It gathers a large amount of personal data of its customers which includes personal information, contacts and credit card number etc.

Computer crimes range from the catastrophic to the merely annoying. A case of computer-driven espionage might wreak devastating losses to national security. A case of commercial computer theft might drive a company out of business. A cracker's prank might not actually cause damage at all--but might cause a video game company or another computer user some annoyance. Some computer crimes are perpetrated for kicks, and some for social or political causes; others are the serious business of professional criminals. There is perhaps no other form of crime that cuts so broadly across the types of criminals and the severity of their offenses.

Most of the organization related to online trading face numerous threats in the face of cyber crimes. These include data attacks, malware, hacking, stealing important and confidential data etc.

Deluxe Corporation became a victim of cyber crime when its system was hacked and all the data regarding the confidential information of its customers such as the credit card information was stolen and misused. The investigation started using the computer forensic technique and the perpetrators were tracked and sentenced.

Why Computer Forensics?

Is computer forensics a necessary field in the Information Age? Although not a focal point of the overall reporting, several high profile news stories this decade have shown computer forensics to have played a major part in ...
Related Ads