ISSC 351 discussion response

Get perfect grades by consistently using www.custompaperwriting.org. Place your order and get a quality paper today. Take advantage of our current 20% discount by using the coupon code GET20


Order a Similar Paper Order a Different Paper

Continue to follow your classmates’ posts throughout the week and post at least one follow-up post to a classmate (minimum of 100 words) by 11:55 p.m. Eastern Time on Sunday. Your follow-up post can add additional insight to a classmate’s opinions or can challenge their opinions. Use examples from the readings, or from your own research, to support your views, as appropriate. Be sure to read the replies to your own posts throughout the remainder of the week and reply to any questions or requests for clarification from your classmates and your professor. Your word count will be based only on your own words and not on any quoted material from the post you are replying to or from any other sources.

Save your time - order a paper!

Get your paper written from scratch within the tight deadline. Our service is a reliable solution to all your troubles. Place an order on any task and we will take care of it. You won’t have to worry about the quality and deadlines

Order Paper Now

Questions:

1. What is computer forensics and how does it differ from other types of forensic science?

2. Compare & contrast public (criminal) investigations and private (corporate) investigations. Please give case examples for comparison.

Comment on at least two other peer student posts.

Complete this forum thread by Sunday of Week 1.

Student 1:

Regina,

When it comes to forensics it is known that this can include computer forensics. It is relatively newer compared to some of the others yet it has continued to be some of the most utilized evidence that is used during a criminal case. Computer forensics is the gathering of data in a very consistent and scientific way that can be utilized in a criminal investigation. Computer can be a broad term that can also mean any electronic device. Even though computer forensics is lumped in with other types of evidence such as DNA and fingerprint evidence it has to be understood that evidence that is collected during the computer forensics investigation would all be digital information. It is also known that this information could be “magnetically stored or encoded”. The most known devices that can be utilized in this event are ones such as laptop computer, smartphones, or printers (Easttom, 2014).

Criminal investigations that utilize computer forensics tend to deal with finding certain data that pertains to a criminal case such as ones of fraud, homicide, or drug trafficking. Corporations can also use digital forensics in order to find evidence of fraud or embezzlement. They can see who used a computer or electronic device at a certain time and what data they might have changed or altered (Easttom, 2014). Often time’s corporations do not bring in criminal investigators if they do not see a blatant crime that was committed yet should they find evidence of sexual harassment or network intrusions, prosecutors will be called in to take the appropriate actions.

Easttom, C. System Forensics, Investigation, and Response PDF VitalBook. [VitalSource]. Retrieved from https://online.vitalsource.com/#/books/9781284038330/.

Do you need help with this or a different assignment? We offer CONFIDENTIAL, ORIGINAL (Turnitin/LopesWrite/SafeAssign checks), and PRIVATE services using latest (within 5 years) peer-reviewed articles. Kindly click on ORDER NOW to receive an excellent paper from our writers.

Get a 15% discount on your order using the following coupon code SAVE15


Order a Similar Paper Order a Different Paper