Topic > Digital Evidence and Forensics - 751

INTRODUCTION: With the increase in the use of computers to commit crimes and the growing demand for computer data in civil proceedings, crimes have developed rapidly allowing forensic experts to extract information useful from computer tests. The field of digital forensics has evolved to allow security professionals to examine evidence from the growing plethora of digital devices to help determine what individuals may have done in the past. Some of the digital crimes are cyber stalking, internet fraud, Nigerian letter scam, phishing, identity theft etc. Forensic jobs are more technical. From corporate server farms to police raids on criminals' homes to modern battlefields, a wide variety of evidence is collected. Help determine what happened and who would be responsible. Some digital forensics jobs are largely procedural and cover a wide variety of areas. Some law enforcement agencies need to produce compelling, legally recognized evidence to prosecute crimes, and companies may need to identify and mitigate an insider threat that requires a lower standard of proof, and military intelligence needs may require action rapid based on a limited amount of information. These forensic researchers must develop new techniques to acquire and analyze data from the new devices they encounter in their cases. Digital evidence is information stored or transmitted in digital format that can be used in court during an investigation. Different organizational entities have unique requirements for forensic findings. WORK DONE IN THE PAST: The first computer crimes were recognized in the Florida Computer Crimes Act of 1978, which includes legislation against the unauthorized modification or deletion of data on a computer system. .... paper makers...and they know the key points for using technology against technology. • Currently few organizations have dominated the digital crime forensic markets that have the tools and solutions for cyber forensic investigations and are eager to train law enforcement agencies to use their tools and solutions to overcome digital crimes and IT. CONCLUSION: • Most digital crimes are committed using technology against technology, which is a vital part of the cybersecurity process. Nowadays, many companies and government agencies are taking precautionary measures by implementing solutions and tools to address digital and cyber crimes. As we gain more knowledge about how crimes are committed with the use of computers, we need to implement more forensic tools to collect evidence more efficiently and fight the crime wave on technology.