1. Interpret how you believe a computer was used to commit the crimes they were being accused The data and information may have been transmitted secretly through electronic mailing. Information may have been posted on AOL notice boards. Information and data can be perused by any AOL subscriber or user. Users may have been lured through social engineering where data and information were leaked through. Crime could also be performed trough sniffing as well as performing intrusion operations through network vulnerabilities. Phishing activities could also be a possible way of committing a crime. Cyber crime Cheap Air Max 98 , cyber espionage, and computer terrorism could have been possible trigger towards computer crimes committed (Infosec Institute, 2015). 2. Suggest at least two (2) examples of certified professionals that could have been used for this case and the influence they would have provided for the prosecution's testimony Computer forensic experts they can assist in discovering lost and deleted files. They are capable of identifying electronic criminals by analyzing the crime scene. Computer forensic experts are capable of providing digital evidence based on the material used like network and IP addresses. They are capable of searching and seizing computers used in implementing a given criminal activities (Ray, 2011). Biometric analysts have the ability to discover fingerprints using marks left on devices. They can provide evidence based on blood stains for prosecution and provision of evidence. They have the ability to use facial recognition technologies. Biometric analysis can provide detailed information containing computer generated graphics of injuries (Ray Cheap Air Max 97 , 2011). 3. Determine the type of computer forensic skills and procedures or tools that could have been used to extract and preserve the data. Comprehensive ability to perform indexing and detailed analysis using forensic software tools like Encase Forensic Edition, X-ways Forensic Addition, Forensic Tool Kit, Paraben may be used in a crime scene to provide better investigation. Other forensic tools include Wireshark forensic tool is a network traffic analyzer that intercepts traffic in the network to analyze packets and perform network sniffing. Network Miner is used to tracking and recovering files while Snort is a tool used for tracking down network intruders (Infosec Institute Cheap Air Max 96 , 2015). 4. Determine the documentation procedures that could have been used to document the evidence Administrative worksheet: documents major events, times, and movements related to searching efforts. It contains initial, and continuing prove that shows that management and administrative steps are being followed to ensure organized search is accomplished a) Narrative Description: documents the general appearance of the scene as observed initially. Contains extreme details about evidence or actual collection of evidence b) Photographic log: It documents the process of scene photography that contains overall Cheap Air Max 95 , medium, and close-up views of a scene. Usually, a log is presented to reveal technical as well as descriptive information concerning photographic task. c) Diagram or sketch: refers to documentation showing evidence of locations and measurements revealing size and distance relationship within a crime scene surroundings d) Evidence recovery log: refers to documentation containing recognition, collection Cheap Air Max 93 , marking, and packaging physical evidence for administrative and as well as chain of custody purposes e) Latent Print lift log: refers to documentation containing recognition, collection, marking Cheap Air Max 90 , and packaging lifts created from latent prints that were discovered at a scene (Crime scene investigator. Net, 2015) Argument Availability of documented evidence would have changed the outcome of criminal acts by facilitating clear follow-up of evidence data and information concerning crimes. It could be easy for the court to have responsible individuals participating in judgment with evidence and prove of legal procedures applied during trial session.
References Sherry Roberts is the author of this paper. A senior editor at Melda Research in research paper services if you need a similar paper you can place your order for cheap research paper services
More About the Author
Author is associated with which is a global Custom Essay Writing and Term Paper Writing Company. If you would like help in Research Papers and Term Paper Help you can visit Custom Writing Service xwholesale.com/]Cheap Air Max Wholesale[/url] Wholesale Air Max WomensWholesale Womens Air Max