Computer Forensics has Revolutionized the Justice Systems of The World


As our current world becomes more and more intertwined with technology, criminal activities are happening in the cyber world, and there must be a science to stop these crimes.

In today’s article, we are going to talk about computer forensics, which is a science that involves using as evidence in civil, criminal or administrative cases, digital information, which is well analyzed.

Computer forensics is like the new kid on the block, because it is at its beginning stages of development.

This science has been developed, because people can use computers to perform criminal and illegal activities, such as hacking into systems, leaking trade secrets, steal personal information through phishing messages, and unleash the terror of new viruses.

Computers, cell phones, PDAs, and other handheld devices, can be thought of as digital brains, which are very durable, because they don’t forget anything.

Electronic closets are used, in the digital brain, to pack detailed copy of every email, text message, document, Internet upload or download, Google search, Facebook personal chat and posting, iPhone web Chatter conversation, photos, financial transactions, and address books.

Criminals are often caught and found guilty, of crimes, due to the amount of information that is left, on each of the electronic closets.

Computer forensics tools, can be used in order to pick through the digital brains, and find skeletons inside these electronic closets.

E-evidence is the name used, for the information extracted from a computer, which can incriminate a person.

Files in computers are traceable, even after deleting that file, because a computer never truly deletes files.

A variety of applications, have been developed, due to the progress made, in computer forensics.

Computers are examined, by law enforcements, when murder, kidnapping and fraud are investigated.

Emails may be examined by investigators, history of internet browsing is viewed and deleted files are located, to be used as evidence, on court.

Inappropriate use of company computers, is also investigated, by companies with the use of computer forensics.

Of course, there are legal implications, when using computer forensics, for overseeing network security.

The policy decisions and technical actions in the context of existing laws, must be considered as well, by any network security professionals.

Before monitoring information that is collected, due to computer intrusion, a company must have authorization to use computer forensics.

When using security monitoring tools, authorization must be secured, because there are legal ramifications, if not done properly.

A federal felony punishable by a fine and/or imprisonment, could be constituted, if violations of any one of the privacy rules are broken.

There are with no doubt, many benefits to computer forensics, however if privacy laws are violated, then a procedure has to be in place, in order to prevent it, from happening again.

Computer forensics however, is indeed useful, and can help an organization identify the correct evidence, that can be used in court, in order to apprehend and prosecute, security violators.

A need for computer forensics, was the reason why this field, was created, because many organizations, saw a good use for this field.

Thank you, for reading this article!!!


Add a Comment

Hernando Cadet

Hi every one, I obtained a bachelor's degree in Bioinformatics back in 2006, from Claflin University, after I received my bachelor's degree, I gained full time employment as a software engineer at a Video Relay Service company, maintaining databases and developing software for a new developed device called the VPAD.

I worked at that company for two years, then I became a web developer, and worked for a magazine for three years. After that job, I worked as a Drupal web developer, as a subcontractor for the NIH, for a year and then left the job to go back to school.

Hernando Cadet

Collaboratively administrate empowered markets via plug-and-play networks. Dynamically procrastinate B2C users after installed base benefits. Dramatically visualize customer directed convergence without

Collaboratively administrate empowered markets via plug-and-play networks. Dynamically procrastinate B2C users after installed base benefits. Dramatically visualize customer directed convergence without revolutionary ROI.