Type of paper:Â | Essay |
Categories:Â | Criminal law Forensic science Cyber security Social issue |
Pages: | 2 |
Wordcount: | 405 words |
According to Infosec Resources (2019), computer forensic investigation underscores the investigation on the data taken from computer storage devices or hard discs with strict adherence to the standard policies and procedures in the determination of a compromised devise by unauthorized access. In cases of computer-related crimes in a company. The three most important people that a forensic investigator must interview to secure evidence include the IT security team, representatives from the human resource, and the security team. Some of the questions that they should be asked concerning the hi-tech crimes underlie the tool that was used to commit the crime, if the perpetrator breached someone’s rights by email or harassment, the nature of the crime whether simple or complex and the type of crime that was committed whether theft or vandalism.
As per Find Law (2019), some of the significant computer-related crimes juxtapose phishing scams, hacking, ransomware, computer viruses, fraud, and identity theft. According to the US Department of Justice (2014), the types of shreds of evidence to initially looking for in such crimes encompass the network configurations, email addresses, identification of remote storage locations, DNA analysis, fingerprints spreadsheets, databases, databases, system logs among others. According to Fox Business (2016), with the rise of the internet of things, broad commercial market, online black-market maturation, and smart devices, computer-related crimes are likely to increase in twenty years. Through intense human malware, cyber jacking, extortion, and assault, brick attacks, and identity theft squared, among others.
According to infosec Resources (2019), a forensic interview process can be improved by incorporating different agencies in vast regions. The participants and facilitators should be well trained and reinforce methodologies aimed at providing support and solving problems. Finally, the forensic interviewers need to remain current with the dynamic technology and design at strengthening their skills on the new developments ion the field to enhance quality. Finally, there should be the introduction of other forensics readiness concepts through minimization of costs during the response of an incidence and maximizing the ability to collect credible digital evidence.
References
Computer crime. (2019, March 19). FindLaw.
https://criminal.findlaw.com/criminal-charges/computer-crime.htmlComputer forensics investigation – A case study. (2019, September 10). Infosec Resources. https://resources.infosecinstitute.com/computer-forensics-investigation-case-study/#gref
The future of crime: 8 cyber-crimes to expect in the next 20 years. (2016, January 8). FoxBusiness. https://www.foxbusiness.com/features/the-future-of-crime-8-cyber-crimes-toexpect-in-next-20-years
US Department of Justice. (2014). Forensic examination of digital evidence: A guide for lawenforcement. CreateSpace. https://www.ncjrs.gov/pdffiles1/nij/199408.pdf
Cite this page
Paper Example. Computer Crimes: Viewing the Future. (2023, Nov 15). Retrieved from https://speedypaper.com/essays/computer-crimes-viewing-the-future
Request Removal
If you are the original author of this essay and no longer wish to have it published on the SpeedyPaper website, please click below to request its removal:
- Re-Election Prospects for Paul Ryan. Politics Essay Example.
- Solution to Gang Violence. Free Essay Sample.
- Ensuring Social Justice and Cultural Competency for Undocumented Immigrants: Essay Sample
- Essay Sample on Boko Haram Terrorist Group
- Free Essay. Definitions of deviant behavior
- Free Paper Example on Ransomware and Virus Protection
- Citizenship: Rights, Privileges & Defense of a Nation - Essay Sample
Popular categories