CHFI Module 1 and Answers Latest
update 100% Solved
Evolution of computer forensics - ✔✔Evolution of computer forensics The evolution of
computer forensics is described below:
1888: Francis Galton made the first-ever recorded study of fingerprints for catching potential
criminals in crimes.
1893: Hans Gross was the first person to apply science to a criminal investigation.
1910: Albert Osborn was the first person to develop the important features of documenting
evidence throughout the examination process.
1915: Leone Lattes was the first person to use blood groupings to catch the criminals.
1925: Calvin Goddard was the first person to use firearms and bullet comparisons to solve
various pending court cases.
1932: The Federal Bureau of Investigation (FBI) set up a laboratory in order to provide forensic
services to all field agents and other law authorities.
1984: The Computer Analysis and Response Team (CART) was developed for providing support
to FBI field offices searching for computer evidences.
1993: The first international conference on computer evidence was held in the United States.
1995: The International Organization on Computer Evidence (IOCE) was developed to provide a
forum to global law enforcement agencies in order to exchange information about cybercrime
investigations and other issues related with computer forensics.
1998: The International Forensic Science Symposium was developed to provide a forum for
forensic managers and exchange information.
2000: The first FBI Regional Computer Forensic Laboratory (RCFL) was established for the
examination of digital evidence for supporting criminal investigations. These investigations
include identity theft, hacking, computer viruses, terrorism, investment fraud, cyberstalking, drug
trafficking, phishing/spoofing, wrongful programming, credit card fraud, online auction fraud,
email bombing and spam, and property crime.
,Objectives of computer forensics - ✔✔The objective of computer forensic is to detect a computer
incident, identify the intruder, and prosecute the perpetrator in a court of law. As the computer
crime incidents escalate from theft of intellectual property to cyber terrorism, its objectives
become more pervasive in nature. The primary objectives of computer forensics are summarized
below:
It recovers, analyzes, and preserves the computer and associated materials in such a way that
they can be presented as evidences in a court of law.
It identifies the evidences in a short amount of time, estimates the potential impact of the
malicious activity on the victim, and evaluates the purpose and identity of the person who is
behind this activity.
Benefits of computer forensics - ✔✔Computer forensics provides the following benefits:
It ensures the integrity and continuous existence of computer system and network infrastructure
of an organization.
If the organization's computer systems or networks do get compromised, it helps in capturing
important information that helps with prosecuting the case.
It extracts, processes, and interprets the actual evidences to prove the attacker's activities and the
organization's innocence in court.
It efficiently tracks down cyber criminals and terrorists from different parts of the world. IP
addresses are used to determine the geographical position of terrorists.
It saves the organization capital and precious time.
It tracks complicated cases, such as child pornography and e-mail spamming.
Forensic readiness - ✔✔Forensic readiness attempts to achieve the following goals:
It gathers critical evidences in a forensically sound manner without interfering the regular
business processes.
,It gathers evidences representing potential criminal activities or disputes that affect an
organization.
It allows an investigation to proceed while keeping cost proportional to the cost of the incident.
It makes sure that the collected evidences can have a positive impact on the outcome of any legal
proceeding.
Benefits of forensic readiness - ✔✔The benefits of forensic readiness are as follows:
Evidence can be gathered to act in the defense of company if subject to a lawsuit.
In case of major incident, a fast and efficient investigation can be conducted and corresponding
actions can be followed with minimal disruption to the business.
The target of information security can be extended to the wider threat form cybercrime.
Fixed and structured approach for storage of evidence can reduce the cost and time of an internal
investigation.
Law enforcement interface can be improved and simplified.
In case of a major incident, proper and in-depth investigation can be conducted.
Forensic science - ✔✔Forensic science is the practical application of various varieties of science
for answering legal system-related questions. It is related to criminal and civil actions. Forensic
science is generally referred to as 'forensics', which in Latin means "of or before the forum". In
the modern age, it refers to a process of gaining criminal evidences to be admitted in a court of
law.
Overview of Computer forensics - ✔✔Computer forensics is the investigative process of
collecting and examining electronic evidence to form a structured report, which can be produced
in a court as evidence. Computer forensics is introduced when crime is facilitated either by using
a computer or on computer or network itself. Computer forensics also deals with issues, such as
, privacy, copy infringement, and software ownership. For the collection of electronic evidence,
certain pre-established procedures and steps are to be followed to confirm the identity of the
culprit. These methodologies are part and parcel of the computer forensics process that help
conduct the investigation of computer crimes more effectively and efficiently.
Security incident report - ✔✔Companies that had security incidents in the last year 83% small
and 92% large.
Average number of breaches 14 small and 45 large.
Average cost of the worst incident $45.2K - $90.5K small and $726,492.43 - $1,792,553.50 large
Aspects of organizational security - ✔✔1. IT security
Application security
Computing security
Data security
Information security
Network security
2. Physical security Facilities security
Human security
Border security
Biometric security
3. Financial security
Security from frauds
Phishing attacks
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller TheeGrades. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $14.99. You're not tied to anything after your purchase.