The Importance of Forensic Analysis
Forensic science can be understood as the application of science to law. In that, it entails a highly advanced technology to disclose scientific evidence in different sectors. The importance of forensic science involves investigating crime scenes to unearth a link that can be used as expert substantiation in court (Carracedo, A. (2007). Thus forensic science seeks to examine and validate evidence found at the crime scene which will be used to ascertain how the crime was conducted as well as identifying the suspect through the DNA in seminal fluid. Moreover, modern forensic science is used in multiple fields such as civil cases, fraud, forgeries or negligence
Information Security Fundamentals
Integrity is understood as the aspect of storing accurate data free from any unauthorized modifications. Thus it reflects logical correctness and reliability of the information stored (Peltier & Blackley, 2005). Integrity is connected to information security since it involves the act of protecting against illegal modifications or obliteration of information hence relying on the principle of authorization, authentication, and non-repudiation.
Delegate your assignment to our experts and they will do the rest.
Authentication involves the practice of verifying the source of a message or any claims from people. It is an integral sector in information security since its role is to validate the origin of information such as emails. Therefore, authentication is used as a security measure which is developed to ascertain the validity of the transmission, originator, message or a method of verifying a person’s authorization to receive particular information (Klipper, 2015).
Confidentiality is the assurance that a message is not revealed to an unapproved person, devices or processes. Confidentiality is used in information security by protecting or concealing information from the unauthorized parties by restricting the number of people who can retrieve the information.
Availability, on the other hand, can be understood as the accessibility of information systems to users. Thus, it provides timely and reliable access to information services only to the authorized persons (Klipper, 2015). It is linked to information security since it protects against data loss or disruptions in connections by providing a backup copy of information that can be accessed only by the relevant persons.
References
Carracedo, A. (2007). Applications in forensic science. Forensic Science International, 169 . Doi:10.1016/j.forsciint.2007.04.135.
Klipper, S. (2015). Cyber security. Essentials . Doi: 10.1007/978-3-658-11577-7.
Peltier, T. R., Peltier, J., & Blackley, J. A. (2005). Information security fundamentals . Boca Raton, FL: Auerbach Publications.