In this section, you will examine the concepts, processes, roles, and context of issues faced by computer forensic specialists on a daily basis, and learn why certain decisions are made in the real workplace.
Concepts: Before you can perform any task, you need to understand critical concepts being used in the computer forensics world. These concepts provide the relative and cumulative framework necessary for effective learning.
Process: Processes are a part of any workplace. In this section, you will learn about the processes that are a part of systems forensics, investigations, and response.
Roles: Most organizations are structured into divisions and departments (e.g. sales, finance, customer service, IT) that are dedicated to performing specific functions and staffed with personnel who have expertise in those functions.
Where different activities in a process require different skills, the process is likely to involve a number of people and departments. It is critical for you to learn who is involved in, or impacted by, computer forensics-related activities, and how individuals in those roles communicate and collaborate with computer forensics specialists.
Context: Computer forensics is carried out in a technical context to discover and preserve evidence for legal use. This section of the lesson will help you understand the technical information you need to know to be a successful computer forensics specialist.
Rationale: This section of the lesson will help you with “Why?” questions. The objective in computer forensics is to recover, analyze, and present computer-based material in such a way that it can be used as evidence in a court of law. Ability to formulate a rationale, or reasoning, behind computer forensic activities that can be understood by lay persons in a court is a critical competency for computer forensic specialists. In this section, you will learn how computer forensic specialists make decisions and explain their actions.
In 1965, Gordon E. Moore, cofounder of Intel, discussed this phenomenon in a paper. The trend for technology to improve while prices decrease is summed up by Moore’s law. Click on each question below to learn more about Moore’s law.
- What is Moore’s law?
- How does Moore’s law apply to digital forensics?
- Google Glass
- GPS devices
- Medical devices that communicate data
- Software as a Service
- The cloud
- Increasing computing power
- Cloud computing
- Changes in the law
- Private labs
- International issues
- Techniques
In this section, you will have an opportunity to practice the concepts and processes that you have explored in this lesson.
The Hands-On Lab provides you with an engaging learning experience that is diagnostic and flexible. Following the instructions provided in the Lab Manual, you will be able to practice the steps computer forensics specialists perform on a daily basis and develop the skills required for effective execution and management of computer forensics.
In this section, you will have an opportunity to apply what you have learned in this lesson. A scenario is provided here that depicts the challenges often faced by professionals in the workplace.
You will explore the scenario, review related critical information, research a topic, and present your findings. Complete your work by submitting the graded assignment.
You are an experienced digital forensics specialist for DigiFirm Investigation Company.
You receive a phone call from Chris, your team leader.
Hello. Chris here.
You may have heard that our biggest client, Major Corporation, is evaluating how they back up their data. I need you to write a paper that compares traditional backup methods to those provided by a cloud service provider, including the security of cloud services versus traditional forms of onsite and offsite backup.
We’ve got a meeting set up with them next week to talk about their options and I’d you like to present your paper at that meeting. Let me know what you come up with.
Companies have traditionally backed up their data using storage area networks and off-site backup networks. The next generation of data storage security is backing up data in a cloud.
Research both traditional and cloud data backup methods. Then write a paper that compares the two. Make sure that you include the security of cloud services versus traditional forms of onsite and offsite backup.
For a checklist of action items, navigate to Course of Action on the right panel of the screen.
Use the following checklist as a guide to complete this assignment. Note that the tasks you have completed are already checked on the list.
Tasks
- Read the verbiage of the phone call from your team leader.
- Consider all the factors that contribute to the challenge.
- Conduct Internet research on traditional data backup methods as well as backing up data in a cloud.
- Write a paper that compares traditional data backup methods with backing up data in a cloud,including the security of cloud services versus traditional forms of onsite and offsite backup.