24 Sep 2022

154

Cyber Crime and Digital Forensics

Format: APA

Academic level: College

Paper type: Assignment

Words: 446

Pages: 1

Downloads: 0

With the increasing use of technology and computer applications, cases of cybercrime have raised and many people have and others are still falling onto the wrong side of cyber criminals. Most common cybercrimes include cyber extortion, forgery, phishing, cyber terrorism, and online harassments among many others (Al-Alawi, 2014). In order to tackle this rising threat, there was a need to develop a mechanism powerful enough to stop and secure victims before or even after the damage occurs; computer forensics. Computer forensics is a law enforcement field powerful when it comes to combating cybercrimes (Technology First, 2018). 

Of all the cybercrimes existing, phishing tends to be the most crucial since it accesses private information such as passwords as well as usernames and details entailed on the credit cards. Cyber criminals do this by disguising themselves as trusted entities (Digital Forensics, n.d). Phishing can be done through emails to the targeted individuals posing as banks or major and highly established institutions or sites. The procedures used in discovering and investigating the evidence of phishing starts the moment computer forensics specialists are informed. The procedures applied in securing the evidence usually require specific techniques as well as tools. Computers and email systems often have a number of software and hardware components, including the server computers and sender’s client as well as the server computer and the receiver’s client having different services and software installed (Banday, 2011). 

It’s time to jumpstart your paper!

Delegate your assignment to our experts and they will do the rest.

Get custom essay

In addition, the use of various internet services and systems are highly appreciated. As much as the information can be deleted from a computer system, it may not be deleted from the server thus an entry point for the computer forensic technicians. Computer forensics usually involves the utilization of specialized software for the purposes of making “an image of a subject system's” physical memory and hard drive and to parse automatically into formats which are human-recognizable (Francis, 2017). Technology has greatly aided in the rapid search as well as evidence analysis across the computer and network system. Foundation of endpoint detection and response (EDR) is greatly used as it packs a number of capabilities, making forensics work easier (Francis, 2017). Different software’s may be used in investigating phishing and preventing it such as the Mimecast. Mimecast phishing software provides at least three protective layers to protect the people and defend them from the growing phishing danger and other related advanced attacks (Mimecast, 2018). 

As the world of technology keeps on growing and expanding dangers in relation to it, cybercrimes which entail cyber extortion, forgery, phishing, cyber terrorism, and online harassments among many others keep rising as well. In order to combat and curb the rising threat of cybercrime then there is a need to develop computer forensics, a perfect tool for dealing with cybercrime. 

References 

Al-Alawi, A. (2014). Cybercrimes, Computer Forensics and their Impact in Business Climate: Bahrain Status. Research Journal of Business Management, 8 (3): 139-156, 2014. DOI: 10.3923/rjbm.2014.139.156. Retrieved from https://scialert.net/fulltextmobile/?doi=rjbm.2014.139.156 

Banday, T. M. (2011). Techniques and Tools for Forensic Investigation of E-Mail. International Journal of Network Security & Its Applications (IJNSA), 3 (6), 227-241DOI : 10.5121/ijnsa.2011.3617 

Francis, R. (2017, May 8). Perpetrators. CSO . Retrieved from https://www.csoonline.com/article/3192348/security/computer-forensics-follows-the-bread-crumbs-left-by-perpetrators.html 

Mimecast. (2018). Phishing Protection Software . Retrieved from https://www.mimecast.com/content/phishing-protection-software/ 

Technology First. (2018). Computer Forensics Takes a Bite Out of Crime . Retrieved from https://www.technologyfirst.org/magazine-articles/144-august-2014/993-computer-forensics-takes-a-bite-out-of-crime.html 

Illustration
Cite this page

Select style:

Reference

StudyBounty. (2023, September 15). Cyber Crime and Digital Forensics.
https://studybounty.com/cyber-crime-and-digital-forensics-assignment

illustration

Related essays

We post free essay examples for college on a regular basis. Stay in the know!

17 Sep 2023
Criminal Justice

Research in Criminal Justice

Research is the primary tool for progressing knowledge in different fields criminal justice included. The results of studies are used by criminal justice learners, scholars, criminal justice professionals, and...

Words: 250

Pages: 1

Views: 165

17 Sep 2023
Criminal Justice

The Art of Taking and Writing Notes in Law Enforcement

Every individual must seek adequate measures to facilitate input for appropriate output in daily engagements. For law enforcement officers, the work description involving investigations and reporting communicates the...

Words: 282

Pages: 1

Views: 183

17 Sep 2023
Criminal Justice

Justice System Issues: The Joseph Sledge Case

The Joseph Sledge case reveals the various issues in the justice system. The ethical issues portrayed in the trial include the prosecutor's misconduct. To begin with, the prosecution was involved in suppressing...

Words: 689

Pages: 2

Views: 252

17 Sep 2023
Criminal Justice

Victim Advocacy: Date Rape

General practice of law requires that for every action complained of there must be probable cause and cogent evidence to support the claim. Lack thereof forces the court to dismiss the case or acquit the accused. It...

Words: 1247

Pages: 4

Views: 76

17 Sep 2023
Criminal Justice

New Rehabilitation and Evaluation

Introduction The rate of recidivism has been on the rise in the United States over the past two decades. Due to mass incarceration, the number of people in American prisons has been escalating. While people...

Words: 2137

Pages: 8

Views: 140

17 Sep 2023
Criminal Justice

Justification of Reflections and Recommendations

Credible understanding and application of criminal justice require adequacy of techniques in analyzing the crime scene, documenting the shooting scene, and analysis of ballistic evidence. The approaches used in...

Words: 351

Pages: 1

Views: 128

illustration

Running out of time?

Entrust your assignment to proficient writers and receive TOP-quality paper before the deadline is over.

Illustration