StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Digital Forensics in the Criminal Justice System - Essay Example

Cite this document
Summary
Be it business or non-business premise, information should be the key thing it is searched on. Most specific, security agencies should always have the proper information for it to work effectively and efficiently. Proper…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.4% of users find it useful

Extract of sample "Digital Forensics in the Criminal Justice System"

SECURITY INFORMATION FORENSIC Introduction Information is the main pillar of any enterprise. Be it business or non-business premise, information should be the key thing it is searched on. Most specific, security agencies should always have the proper information for it to work effectively and efficiently. Proper information system ranges from digital and the non-digital systems (Beaver, Lambert & Morse, 1980). They should always be updated and well connected with the modern requirements. This paper looks at the information systems in custody evidence area of Mr.

Yourprop’s former Company work area. The paper looks at the work area with the discussion of the digital and non-digital items in Mr. Yourprop’s former Company work area. For the company to achieve its objectives, the work area items should support the working condition of the workers in the company.Before searching for Mr. Yourprop’s former Company work area, the searcher should first get the authority to enter into the premises. The searcher should first seek the permission of the owner of the company.

This allows the owner to have the full confidence of the person who is searching the company. During the documentation of the authority, the researcher should ensure that he/she has created trust in the mind of the owner. He/she should show evidence of authentication and certificate for searching. He/she show a permit of search from a registered company by law or an authority letter from a government agency. Having all this is one of the means of getting trust from the company on search. The letter should be signed and stamped by a person in authority showing authentic measures (McNurlin, Sprague & Bui, 1989).

On the side of the company being searched, the officials there or the CEO should accept the request for being searched. The CEO should consider search after finding that the searcher is authorized from a recognised office. He/she should sign the letter and keep a photocopy or a scanned copy of the letter.In the photo of Mr. Yourprop’s work area, there are three main digital items evidence. These are; Desktop and Laptop, Digital Voice Recorder and USB flash disk. In the laptop and the desktop, the memory storage may hold a lot of information.

The information could be ranging from financial information, human information, accounts, quality and standard with other more information. This information help the search work of search. The Second item is the voice recorder. The voice recorder will help to get any voice recorded in a meeting or the office. Lastly, the USB flash disk also is saving the asset. During the search work, the searcher can get the information saved by the workers of the company to support the research work. The information found in the digital asset will help to support the information digital forensic evidences.In the Mr. Yourprops work area, the company uses notebook as no digital evidence.

The notebook will support the search as the searcher will get the information recorded in the notebook. Secondly, the office uses stickers. Stickers are stacked in the strategic position as a reminder of something ought to be done. Through this, the searcher will get the information on the daily activities done in the company. Lastly, there is a file in the upper case of the office shelf. The files may help to get the manual information to support the evidence.For item one, the co-worker has not given some few details on the item.

Some of the information omitted are the item one has buttons that may be used to get the information from it. In addition, the voice recorder seems to have a speaker which means one can get the information from it through voice listening. Secondly, the second information is not giving one main detail. As from the sticker, it is evident that is torn, and the co-worker has given the information. However, the worker has omitted that the sticker is somehow cancelled by a marking pen meaning there is information hidden.

To store the evidence collected, the searcher should make sure that the evidences are well recorded. The place should be well secured from the theft and any peril. The place should have a cool and dry environment to prevent any destruction (Von, 2004). ReferencesBeaver, W., Lambert, R., & Morse, D. (1980). The information content of security prices. Journal of Accounting and Economics, 2(1), 3-28.McNurlin, B. C., Sprague, R. H., & Bui, T. X. (1989). Information systems management in practice.

Prentice-Hall International.Von Solms, B., & Von Solms, R. (2004). The 10 deadly sins of information security management. Computers & Security, 23(5), 371-376.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Digital Forensics in the Criminal Justice System Essay - 4”, n.d.)
Digital Forensics in the Criminal Justice System Essay - 4. Retrieved from https://studentshare.org/law/1688888-digital-forensics-in-the-criminal-justice-system
(Digital Forensics in the Criminal Justice System Essay - 4)
Digital Forensics in the Criminal Justice System Essay - 4. https://studentshare.org/law/1688888-digital-forensics-in-the-criminal-justice-system.
“Digital Forensics in the Criminal Justice System Essay - 4”, n.d. https://studentshare.org/law/1688888-digital-forensics-in-the-criminal-justice-system.
  • Cited: 0 times

CHECK THESE SAMPLES OF Digital Forensics in the Criminal Justice System

Bloodstain Pattern Analysis

The paper "Bloodstain Pattern Analysis" describes the concept of BPA (blood sample analysis) refers to the view that when blood exits the human body or an object is covered with blood, this leads to the creation of models that can be analyzed and interpreted.... hellip; The analysis of these patterns and the outcome of this analysis in conjunction with the event or the situation in which these patterns are found and the level of reliability of these patterns are dependant on the individuals who have gained training and experience in the field of understanding and analyzing them....
7 Pages (1750 words) Essay

Collective Effort and Collective Liability

These intentional misuses of personal information are punishable whether they are carried out by hand, through the conventional postage system, or through electronic means (18 U.... These intentional misuses of personal information are punishable whether they are carried out by hand, through the conventional postage system, or through electronic means (18 U....
6 Pages (1500 words) Essay

The role of federal agencies in fighting digital crime

?Techno securitys guide to e-discovery and digital forensics.... National Security Agency is another one of the agencies that are in charge of the computerized coding system.... They design as well as maintain this whole system and protect the information about the United States.... Another agency that works to prevent digital crime is the Department of justice.... It works with the Department of justice to protect the computer systems that belong to the government against extremists and terrorists....
2 Pages (500 words) Essay

Phase 5 Individual Project

However, the United States courts emphasize proper use of DNA technology in ensuring equitable application of justice.... One of the purposes of DNA testing is to identify suspects in criminal proceedings.... It can be used to exonerate suspects from criminal liability....
4 Pages (1000 words) Assignment

Cyber Security, Cyber Crime and Cyber Forensic

National Security Agency – this section of the organization is charged with the mandate to protect United States' information system from unauthorized access.... This is achieved through designing of coding systems that are computerized so as to preserve the integrity of the state's information system.... The department of justice – this department is chaired by the attorney general who is charged with the mandate to represent the state in matters that desire a legal approach....
2 Pages (500 words) Assignment

DNA and the Criminal Justice System

DNA and the criminal justice system: The Technology of Justice.... The first application of DNA in the course of law and justice was in the 1980s, whereby the prosecutors used DNA evidence to solve a rape case.... New York: Britannica digital Learning....
1 Pages (250 words) Research Paper

Policing and the Force Control Room

Response and recovery processes should be used by police to conduct an effective initial investigation in an emergency or incident.... Response process includes reaction, rescue and retrieval and investigation phases while recovery process includes relief and remediation phases.... … The Force Control Room (FCR) should receive the emergency calls coming directly from the public....
6 Pages (1500 words) Essay

Challenges in Handling Electronic Evidence

nbsp;… Generally, computer forensics has become a booming trade as it is important to unearth data and then further analyze it to make it applicable in the criminal case.... From the paper "Challenges in Handling Electronic Evidence" it is clear that e-evidence has grown to become increasingly important in the court of law....
7 Pages (1750 words) Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us