Here is the synopsis of our sample research paper on Computer Forensics: A Rapidly Growing Discipline
. Have the paper e-mailed to you 24/7/365.
Essay / Research Paper Abstract
This 10 page paper gives an overview of computer forensics and explains how an investigation is conducted. It also touches on laws safeguarding personal data and includes a brief literature review. Bibliography lists 9 sources.
Page Count:
10 pages (~225 words per page)
File: D0_HVComFor.rtf
Buy This Term Paper »
 
Unformatted sample text from the term paper:
growing so rapidly; and explains how to conduct a forensic investigation. It also touches on laws that are being passed to safeguard the privacy of personal data; finally, it considers
why a person working in computer forensics makes a significant contribution to the field. A literature review comprises much of the paper. Discussion What is computer forensics? Computer forensics is
also known as: "computer forensic analysis, electronic discovery, electronic evidence discovery, digital discovery, data recovery, data discovery, computer analysis, and computer examination" (Overview of computer forensics technology); though as well
see in the literature review, at least one author differentiates between some of these terms. The data collected in the process is examined by a computer forensics expert so that
he or she can reconstruct the activities of the computer user (Overview of computer forensics technology). Computer forensics is, in other words, "the collection, preservation, analysis, and presentation of computer-related
evidence" (Overview of computer forensics technology). Computer evidence is useful in many different settings, including civil and criminal proceedings, and human resources functions (Overview of computer forensics technology). Because computers,
PDAs and cell phones are now ubiquitous, the information stored on them is relevant to an "increasing number of conflicts and crimes" (Overview of computer forensics technology). Whereas "computer evidence"
used to refer to ordinary print-outs, now it includes not only the familiar print out but also "data media and computers themselves," which law enforcement officials have begun seizing as
they have gotten smaller (Overview of computer forensics technology). In the recent past, investigators "generated their own printouts, sometimes using the original application program, sometimes specialist analytic and examination tools"
(Overview of computer forensics technology). Even more recently, experts have found ways to collect evidence even if they dont have "immediate physical access" to it, provided such computers "are accessible
...