Google

The Roles and Duties of the Computer Forensic in the Criminal Justice Field

In the global village called the internet, not everyone plays nice. You always hear of the word "hack". It is mostly used in relation to invading of computers. Most of these are not entirely true but computer network systems do get hacked. If and when it does happen, it usually involves something sinister.

Even employees of companies do engage in snooping or to use our favorite word, hacking. The birth of the internet has led to more of this. Anyone can be anything online. This is why fraud, phishing, and identity theft happen.

The computer has become an important part of everyday life. Sending letters have been entirely changed by emails. Communications have been dominated by instant and text messaging. Portable storage devices that were an exclusive preserve of Information Technology professionals are now used by the general public.

I think you are already getting the idea of why computer forensics are needed. In the event that hacking does occur, the computer forensic will do the following:

1. Like any other investigation, the computer forensic must handle the area as a crime scene. He or she will take digital photographs and secure documentary evidence. This will include printouts, notes and disks in the scene.

If you are the one who hired the computer forensic expert, you should leave everything to them. The computer system should be left as is whether it is turned on or off.

If the computer was left on, the analyst will gather all the information that he or she can from the running applications. The computer will then be shutdown in a way that the data will not be lost. Doing a standard shutdown or pulling the plug is not an option. Both of these methods may cause the loss or damage of the data in the computer system.

2. The forensic investigator must then document the configuration of the system as you would document a crime scene. This should include the order of hard drives, modem, LAN, storage subsystems, cable connections, and wireless networking hardware. The analyst may make a diagram to go along with the digital photographs. They will also take portable storage devices within the area that may contain substantial evidence.

3. The computer forensic expert must take all the evidence to the lab. This is because the analyst should not examine the evidence in the same hardware. People who engage in cyber crimes are also aware that important data can be retrieved to convict them. Countermeasures, viruses and booby traps may be installed in the system to damage electronic evidence.

Analysts take the hard drive in their lab instead to make an exact duplicate of its contents. This process is called Imaging. Analysts have their own tools to make sure that the data is copied completely and accurately.

The duplicate will then be verified by an algorithm. The data is then examined and analyzed. The analyst makes a report of his or her findings and the process that was taken during the investigation starting from the acquisition of the data. This evidence will be presented in court if prosecution is necessary.

The computer forensic plays many roles and duties in the criminal justice field. It is hard to cover all of them in this short article. I encourage you to do more reading if you are interested in this field. You can do this by visiting websites that cover the profession in more detail.

Note: You are free to reprint or republish this article. The only condition is that the links should be clickable.

Copywrite Kenneth Echie. Kenneth writes for Criminal Justice Degrees. Get free scholarship report and learn about Computer Forensics by visiting.

Article Source: http://EzineArticles.com/?expert=Kenneth_Echie

| 925 Sterling Silver Jewellerys | Video On Demand | ATV-Sport | Baby Monitor | Basket Ball Shoes | Lady Fashion Shoes | Bedroom Sets | Best LCD TV Brand | Best Wireless Bluetooth Headset | Body Massager | Brand Sport Shoes | Brands Handbag | Car Monitor | Car MP3 Player | CCTV Camera | CCTV Systems | CDMA Cell Phones | Cheap Mountain Bikes | Cheap Road Bikes | Computer Monitor | Costume Jewellery | Dressing Shoes | Fashion Jewellery | Fashion Handbags | Fashion T-shirts | Fashionable Sports Shoes | Fashion Handbags | Fashion Shoes | Fire Extinguisher | Fishing Boats | Flash Memory Cards | Flash USB Disk | Gas BBQ | Gas Grill | Gold Jewellery | GSM Cell Phones | Home DVD Player | Ice Breakers | Integrated Kitchen Cabinets | Kids Children Furniture | Lady T-Shirt | LCD TV With DVD Combo | LCD TV With DVD Player | LCD Monitor | LED Lights | Memorial Cards | Mibo Shade | Mini Bluetooth Headset | Mini Digital Camera | Mini DVD Player | Mobile Phone Bluetooth Headset | Modern Leather Sofas | MP3 Necklace | Nokia Cell Phones | Notebook Keyboard | Outdoor Patio Furniture | Pave Diamond Wedding Bands | PC Video Cards | PC Webcam | Plywood | Polyester Fabric | Popular Shoes | Prenatal Vitamins | Safety Shoes | Sata Hard Drive | Sata Harddrive | Seas Pearl Necklace | Security Cameras | Server Hard Drive | Skin Care Products | Skin Moisturizer | Skin Oil Control | Slim Digital Camera | Slim Keyboard | Slimming Diet Pills | Small Electric Skillet | Solar Lights | Sportbasketball Shoes | Sterling Silver Jewellery | TFT LCD Display | TFT LCD Monitor | TFT LCD TV | Tiffany Lamps | USB Card Reader | USB Disk | USB DVD Player | USB External Harddrive | USB Webcam | Window Blinds | Wireless Baby Monitor | Wireless Keyboard | Wireless Multimedia Keyboard | Women Beautiful Shoes | Discounttire | Sexual Toys | iPhone 3G Accessories | Whirlpool Bathtubs | Toilets | Americanracing | Christringminist | HTC Max 4g | Car Electronics | Satellite Television | HP Laptops | HP United States | Discount Computer Software | Borders Books | Acer United States | Video Game Players | Buy Cheap Apple iPods | Magazines USA | USA Electronics | Video VHS Used Videos | Kitchen H ousewares Small Appliances Cookware | Furniture Decor Dining Bedroom Patio | Bed Bath Bedding Bathroom Accessories | Home Appliances Air Conditioners Sewing Machines | Housewares Kitchens | Home Improvement Garden Tools Lawn Hardware | Outdoor Living Grills Patio Furniture | Pet Supplies Birds Sats Dogs | Sewing Craft Hobby | Grocery Breakfast Foods Snacks Organic | Natural Organic Grocery | Gourmet Food Gifts Chocolate Seafood | Health Personal Care Nutrition Fitness | Beauty Makeup Fragrance Skin Care | Jewelry Watches Engagements Rings Diamonds | Tools Power Cordless Saws Drills | Lawn Garden Tools Hardware | Automotive Auto Truck Replacements Parts | Powersports Automotive | Industrial Scientific Fastners Raw Materials | Watches Mens Womens Children Accessories | Shoes Men Women Kids Baby | Apparel Accessories Men Women | Office Products Supplies Electronics Furniture | Musical Instruments Accessories Sound Recording | Toys Games Electronics Action Figures | Computer Video Games Hardware Accessories | Baby Car Seats Strollers Bedding | PC Components Computer Add Ons Computers | Software Business Education Finance Childrens | DVD Used HD Action Comedy Oscar | MP3 Music Download | Music Rock Classical Pop Jazz | Canon United States | Computer Tips Online |