Computer Sciences and Information Technology
135 words for each question

1. What is computer forensics and how does it differ from other types of forensic science?

2. Compare & contrast public (criminal) investigations and private (corporate) investigations. Please give case examples for comparison.
Topic:
Computer Forensics
1. What is computer forensics, and how does it differ from other types of forensic science?
Computer forensics encompasses collecting and obtaining analytic information from computer devices for evidence purposes (InfoSec resources, n.d.). It entails finding evidence in computers and stored digital media. The examinations done in computer forensics are different from other forensic types as it depends on the data being investigated, the primary objectives of the investigation and the available resources. Despite being a digital forensic field, scientific methods could also be applied to capture relevant information. In the event that a scientific method is applied to the computer forensics investigation, the underlying fundamental process remains unchanged. Scientific investigations follow a particular rationale: applying to reason, utilizing numerous observations, and undertaking the examinations (InfoSec resources, n.d.). Furthermore, computer forensics entails looking for information from digital storage media and computers, unlike other forensics dealing with DNAs and fingerprints. Computer forensics can be an important source of information to solving investigations being done by other forensic types such as lost or hidden evidence.
2. Compare & contrast public (criminal) investigations and private (corporate) investigations. Please give case examples for comparison.
Public investigations entail government agencies carrying out investigations for criminal prosecutions and will act under particular restrictions stipulated in the law and government policies such as search and seizure rules. Conversely, private investigations do not have stipulated regulations to be followed except when created in their organizations. Private investigations are carried out incorporates as they look into their workers’ conduct for any malicious activity. For public investigations, several individuals within the public sectors will typically be involved; such as an investigation in law enforcement will include police officers, forensic specialists, assigned investigators among other parties (Nelson et al., 2010). The private (corporate) investigation does not contain a particular investigation process but will utilize monitoring systems that look into their employees’ operations without impeding their daily operations. Most corporate investigations involve espionage and embezzlement of funds (Nelson et al., 2010). An example of a public investigation would be Bradley Manning, a military person who stole and shred secret files. His Computer would be confiscated, and liable for 22 charges after full investigation (Keyes, 2011). Conversely, a private investigation would be a company like Walmart carrying computer forensic investigations that led to hacking and customer information loss.

References
Keyes, C. (2011). Manning’s Computer had downloaded secret documents. In CNN. Retrieved from https://www.cnn.com/2011/12/18/justice/bradley-manning-hearing/index.html#
InfoSec Resources. (n.d.). Forensic science. Retrieved from https://resources.infosecinstitute.com/category/computerforensics/introduction/areas-of-study/forensic-science/#gref
Nelson, B., Phillips, A., & Steuart, C. (2010). Guide to Computer Forensics and investigations (4th ed.). Boston, MA: Course Technology.

Published by
Essays
View all posts