-
Essay / Digital Evidence and Forensics - 751
INTRODUCTION:With the increasing use of computers to commit crimes and the growing demand for computer data in civil proceedings, crimes have rapidly expanded for forensic experts to extract evidence from. useful information from computer evidence. The field of digital forensics has evolved to allow security professionals to examine evidence from a growing plethora of digital devices to determine what individuals might have done in the past. Some of the digital crimes are cyberstalking, internet fraud, Nigerian scam letters, phishing, identity theft, etc. Forensic work is more technical. From corporate server farms to police raids on criminals' homes to modern battlefields, a wide variety of evidence is collected. This helps determine what happened and who might be responsible. Some work in digital forensics is largely procedural and covers a wide variety of areas. Some law enforcement agencies must produce compelling, legally recognized evidence to prosecute crimes, and businesses may need to identify and mitigate an insider threat that requires a lower level of proof, and military intelligence needs may require rapid action based on a limited amount of information. These forensic researchers must develop new techniques to acquire and analyze data from the new devices they encounter in their cases. Digital evidence is information stored or transmitted in digital form that can be used in court during an investigation. Different organizational entities have unique requirements for forensic outcomes.WORK DONE IN THE PAST:The first computer crimes were recognized in the Florida Computer Crimes Act of 1978, which includes legislation against unauthorized modification or deletion of data on a computer system...... middle of paper ......s creators, and they know the key points for using technology against technology.• Currently, few organizations have dominated the medical markets- digital crime forensics who have the tools and solutions for cyber forensic investigations and look forward to training law enforcement agencies to use their tools and solutions to combat digital crime and cybercrime. CONCLUSION: • Most digital crimes are committed using technology against technology, which is an essential part of the IT security process. Nowadays, many companies and government agencies are taking precautionary measures by implementing solutions and tools to combat digital crime and cybercrime. As more knowledge is gained about how crimes are committed using computers, more forensic tools must be implemented to collect evidence more effectively and combat the wave of technological crime..