SlideShare a Scribd company logo
1 of 6
Summary   1


Running head: SUMMARY




                           Summary

                        [Author’s Name]

                        [Tutor’s Name]

                            [Class]
Summary           2


                                           Abstract

       Computer forensics emerged as a scientific response to the increased used of

computers and information technologies, as well as the legal response to the growing number

of crimes involving computer and information solutions. A whole set of legal and

administrative laws and guidelines govern computer forensics, but the USA Patriot Act is

fairly regarded as the first and probably, the major legal aspect of computer forensics today.

In his article, Null (2005) provides a detailed observation of what computer forensics is and

how the USA Patriot Act refers to the current system of computer forensics principles.
Summary        3


                                            Summary

       Computer forensics emerged as a scientific response to the increased use of computers

and information technologies, as well as the legal response to the growing number of crimes

involving computer and IT solutions. A whole set of legal and administrative laws and

guidelines govern computer forensics, but the USA Patriot Act is fairly regarded as the first

and probably, the major legal driver of computer forensics today. In his article, Null (2005)

provides a detailed observation of what computer forensics is and how the USA Patriot Act

governs the current system of principles in computer forensics.

       According to Null (2005) in 2004 alone companies reported more than $377 million

losses because of computer related crimes. Given that more and more courts turn to

computers and information as the major sources of evidence in criminal cases, computer

forensics is gradually becoming the key element of successful crime investigation. Generally,

computer forensics is defined as “the process of scientifically examining and analyzing data

anywhere from computer storage to media so that the data can be used as evidence in court”

(Null, 2005). Computer forensics involves a range of computer investigation and

identification processes, from extracting and preserving the data up to interpreting and

presenting this data in court. Although the U.S. market for computer forensics constantly

grows, there is still a shortage of professionals and experts, as well as the lack of practical

experience and knowledge in different computer subjects (Null, 2005). However, not the state

of science and art in computer forensics but its legality attracts special attention. In this

context, Null (2005) suggests that the USA Patriot Act is “one of the most influential federal

statutes to be put in place because of the use of computer forensics in law enforcement”. Null

(2005) believes that the USA Patriot Act has completely changed the way professionals in

computer forensics operate when gathering and interpreting digital evidence. Null (2005)
Summary           4


asserts that sections 202 and 209 of the Patriot Act have caused the major shifts in the current

professional attitudes to computer forensics.

       Section 202 of the USA Patriot Act makes it possible for forensic professionals to

access and gather wire communications that involve voice in hacking situations (Null, 2005).

As a result, this evidence can also be presented in court. By capturing wire communications,

law officials can monitor and record threatening communications, which can also be used

against defendants in court (Null, 2005). Null (2005) discusses section 209 of the USA

Patriot Act, which changed the way and rules forensic professionals should follow to access

stored voice communications. Earlier, when law authorities had to access stored voice

communications with a third-party provider a wiretap order was required, while accessing

voice communications on an answering machine required a search warrant; now, the term

‘electronic storage’ no longer exists, and with a search warrant officials can gain access to

any kind of stored voice communications (Null, 2005).

       It should be noted, that the USA Patriot Act was designed to fit the legal requirements

of the U.S. Constitution, namely, its Fourth Amendment. That law officials can readily gain

access to Internet files and stored computer information is clear, and for this reason both the

Fourth Amendment and the USA Patriot Act had to delineate forensic practices that are

acceptable and unacceptable in specific crime situations. Where forensic criminals could not

balance security with privacy, the USA Patriot Act had to fulfill this role (Null, 2005). As a

result, both the Act and the Fourth Amendment became a kind of a legal barrier on forensic

professionals’ way to evidence gathering. Unfortunately, the Patriot Act did not resolve all

forensic issues: for example, forensic professionals often fail to properly document the

process of gathering digital evidence or cannot trace the process of changing digital data due

to its relative invisibility (Null, 2005). Nevertheless, the USA Patriot Act lays the foundation
Summary    5


for the development of appropriate rules and guidelines necessary to manage the process of

gathering and interpreting digital data for the purposes of computer forensics.
Summary     6


                                        References

Null, J.D. (2005). Computer forensics: The modern crime fighting tool. The Journal of

       Computer Information Systems, 46 (2): 115-119.

More Related Content

Similar to Perfectessay.net coursework sample #4 apa style

01 computer%20 forensics%20in%20todays%20world
01 computer%20 forensics%20in%20todays%20world01 computer%20 forensics%20in%20todays%20world
01 computer%20 forensics%20in%20todays%20worldAqib Memon
 
Malware analysis
Malware analysisMalware analysis
Malware analysisAnne ndolo
 
Computer Forensic: A Reactive Strategy for Fighting Computer Crime
Computer Forensic: A Reactive Strategy for Fighting Computer CrimeComputer Forensic: A Reactive Strategy for Fighting Computer Crime
Computer Forensic: A Reactive Strategy for Fighting Computer CrimeCSCJournals
 
Seminar Proposal Presentation on "Web Based System for of Citation Court Case...
Seminar Proposal Presentation on "Web Based System for of Citation Court Case...Seminar Proposal Presentation on "Web Based System for of Citation Court Case...
Seminar Proposal Presentation on "Web Based System for of Citation Court Case...Omisore Olatunji
 
cyber law and forensics,biometrics systems
cyber law and forensics,biometrics systemscyber law and forensics,biometrics systems
cyber law and forensics,biometrics systemsMayank Diwakar
 
Computer ForensicsDiscussion 1Forensics Certifications Ple.docx
Computer ForensicsDiscussion 1Forensics Certifications Ple.docxComputer ForensicsDiscussion 1Forensics Certifications Ple.docx
Computer ForensicsDiscussion 1Forensics Certifications Ple.docxdonnajames55
 
120208-NYLJ-Kass-and-Reese[2]
120208-NYLJ-Kass-and-Reese[2]120208-NYLJ-Kass-and-Reese[2]
120208-NYLJ-Kass-and-Reese[2]Lawrence Kass
 
4.content (computer forensic)
4.content (computer forensic)4.content (computer forensic)
4.content (computer forensic)JIEMS Akkalkuwa
 
ORIGINAL PAPERAt the foundations of information justice.docx
ORIGINAL PAPERAt the foundations of information justice.docxORIGINAL PAPERAt the foundations of information justice.docx
ORIGINAL PAPERAt the foundations of information justice.docxaman341480
 
ORIGINAL PAPERAt the foundations of information justice.docx
ORIGINAL PAPERAt the foundations of information justice.docxORIGINAL PAPERAt the foundations of information justice.docx
ORIGINAL PAPERAt the foundations of information justice.docxvannagoforth
 
Electronic Surveillance of Communications 100225
Electronic Surveillance of Communications 100225Electronic Surveillance of Communications 100225
Electronic Surveillance of Communications 100225Klamberg
 
Electronic Surveillance Of Communications 100225
Electronic Surveillance Of Communications 100225Electronic Surveillance Of Communications 100225
Electronic Surveillance Of Communications 100225Klamberg
 
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAINCOMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAINamiable_indian
 
Computer Forensics in Fighting Crimes
Computer Forensics in Fighting CrimesComputer Forensics in Fighting Crimes
Computer Forensics in Fighting CrimesIsaiah Edem
 
Investigating and Prosecuting Cyber Crime - Forensic Dependencies and Barrier...
Investigating and Prosecuting Cyber Crime - Forensic Dependencies and Barrier...Investigating and Prosecuting Cyber Crime - Forensic Dependencies and Barrier...
Investigating and Prosecuting Cyber Crime - Forensic Dependencies and Barrier...Cameron Brown
 
A Literature Review On Cyber Forensic And Its Analysis Tools
A Literature Review On Cyber Forensic And Its Analysis ToolsA Literature Review On Cyber Forensic And Its Analysis Tools
A Literature Review On Cyber Forensic And Its Analysis ToolsSamantha Vargas
 
Fourth amendment cloud darren chaker
Fourth amendment cloud darren chakerFourth amendment cloud darren chaker
Fourth amendment cloud darren chakerDarren Chaker
 

Similar to Perfectessay.net coursework sample #4 apa style (20)

01 computer%20 forensics%20in%20todays%20world
01 computer%20 forensics%20in%20todays%20world01 computer%20 forensics%20in%20todays%20world
01 computer%20 forensics%20in%20todays%20world
 
Malware analysis
Malware analysisMalware analysis
Malware analysis
 
Computer Forensic: A Reactive Strategy for Fighting Computer Crime
Computer Forensic: A Reactive Strategy for Fighting Computer CrimeComputer Forensic: A Reactive Strategy for Fighting Computer Crime
Computer Forensic: A Reactive Strategy for Fighting Computer Crime
 
Seminar Proposal Presentation on "Web Based System for of Citation Court Case...
Seminar Proposal Presentation on "Web Based System for of Citation Court Case...Seminar Proposal Presentation on "Web Based System for of Citation Court Case...
Seminar Proposal Presentation on "Web Based System for of Citation Court Case...
 
cyber law and forensics,biometrics systems
cyber law and forensics,biometrics systemscyber law and forensics,biometrics systems
cyber law and forensics,biometrics systems
 
Theory Cyberspace
Theory CyberspaceTheory Cyberspace
Theory Cyberspace
 
Computer ForensicsDiscussion 1Forensics Certifications Ple.docx
Computer ForensicsDiscussion 1Forensics Certifications Ple.docxComputer ForensicsDiscussion 1Forensics Certifications Ple.docx
Computer ForensicsDiscussion 1Forensics Certifications Ple.docx
 
120208-NYLJ-Kass-and-Reese[2]
120208-NYLJ-Kass-and-Reese[2]120208-NYLJ-Kass-and-Reese[2]
120208-NYLJ-Kass-and-Reese[2]
 
4.content (computer forensic)
4.content (computer forensic)4.content (computer forensic)
4.content (computer forensic)
 
ORIGINAL PAPERAt the foundations of information justice.docx
ORIGINAL PAPERAt the foundations of information justice.docxORIGINAL PAPERAt the foundations of information justice.docx
ORIGINAL PAPERAt the foundations of information justice.docx
 
ORIGINAL PAPERAt the foundations of information justice.docx
ORIGINAL PAPERAt the foundations of information justice.docxORIGINAL PAPERAt the foundations of information justice.docx
ORIGINAL PAPERAt the foundations of information justice.docx
 
Electronic Surveillance of Communications 100225
Electronic Surveillance of Communications 100225Electronic Surveillance of Communications 100225
Electronic Surveillance of Communications 100225
 
Electronic Surveillance Of Communications 100225
Electronic Surveillance Of Communications 100225Electronic Surveillance Of Communications 100225
Electronic Surveillance Of Communications 100225
 
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAINCOMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
 
Computer Forensics in Fighting Crimes
Computer Forensics in Fighting CrimesComputer Forensics in Fighting Crimes
Computer Forensics in Fighting Crimes
 
Investigating and Prosecuting Cyber Crime - Forensic Dependencies and Barrier...
Investigating and Prosecuting Cyber Crime - Forensic Dependencies and Barrier...Investigating and Prosecuting Cyber Crime - Forensic Dependencies and Barrier...
Investigating and Prosecuting Cyber Crime - Forensic Dependencies and Barrier...
 
A Literature Review On Cyber Forensic And Its Analysis Tools
A Literature Review On Cyber Forensic And Its Analysis ToolsA Literature Review On Cyber Forensic And Its Analysis Tools
A Literature Review On Cyber Forensic And Its Analysis Tools
 
Computer forencis
Computer forencisComputer forencis
Computer forencis
 
Fourth amendment cloud darren chaker
Fourth amendment cloud darren chakerFourth amendment cloud darren chaker
Fourth amendment cloud darren chaker
 
3170725_Unit-5.pptx
3170725_Unit-5.pptx3170725_Unit-5.pptx
3170725_Unit-5.pptx
 

More from David Smith

Perfectessay.net term paper sample #1 mla style
Perfectessay.net term paper sample #1 mla stylePerfectessay.net term paper sample #1 mla style
Perfectessay.net term paper sample #1 mla styleDavid Smith
 
Perfectessay.net term paper sample #2 apa style
Perfectessay.net term paper sample #2 apa stylePerfectessay.net term paper sample #2 apa style
Perfectessay.net term paper sample #2 apa styleDavid Smith
 
Perfectessay.net term paper sample #1 apa style
Perfectessay.net term paper sample #1 apa stylePerfectessay.net term paper sample #1 apa style
Perfectessay.net term paper sample #1 apa styleDavid Smith
 
Perfectessay.net coursework sample #1 mla style
Perfectessay.net coursework sample #1 mla stylePerfectessay.net coursework sample #1 mla style
Perfectessay.net coursework sample #1 mla styleDavid Smith
 
Perfectessay.net coursework sample #2 apa style
Perfectessay.net coursework sample #2 apa stylePerfectessay.net coursework sample #2 apa style
Perfectessay.net coursework sample #2 apa styleDavid Smith
 
Perfectessay.net research paper sample #6 apa style
Perfectessay.net research paper sample #6 apa stylePerfectessay.net research paper sample #6 apa style
Perfectessay.net research paper sample #6 apa styleDavid Smith
 
Perfectessay.net research paper sample #4 apa style
Perfectessay.net research paper sample #4 apa stylePerfectessay.net research paper sample #4 apa style
Perfectessay.net research paper sample #4 apa styleDavid Smith
 
Perfectessay.net research paper sample #2 apa style
Perfectessay.net research paper sample #2 apa stylePerfectessay.net research paper sample #2 apa style
Perfectessay.net research paper sample #2 apa styleDavid Smith
 
Perfectessay.net research paper sample #1 apa style
Perfectessay.net research paper sample #1 apa stylePerfectessay.net research paper sample #1 apa style
Perfectessay.net research paper sample #1 apa styleDavid Smith
 
Perfectessay.net essay sample #2 chicago style
Perfectessay.net essay sample #2 chicago stylePerfectessay.net essay sample #2 chicago style
Perfectessay.net essay sample #2 chicago styleDavid Smith
 
Perfectessay.net essay sample #1 chicago style
Perfectessay.net essay sample #1 chicago stylePerfectessay.net essay sample #1 chicago style
Perfectessay.net essay sample #1 chicago styleDavid Smith
 
Perfectessay.net essay sample #2 apa style
Perfectessay.net essay sample #2 apa stylePerfectessay.net essay sample #2 apa style
Perfectessay.net essay sample #2 apa styleDavid Smith
 
Perfectessay essay sample_harvard_style_2
Perfectessay essay sample_harvard_style_2Perfectessay essay sample_harvard_style_2
Perfectessay essay sample_harvard_style_2David Smith
 
Perfectessay essay sample_harvard_style_1
Perfectessay essay sample_harvard_style_1Perfectessay essay sample_harvard_style_1
Perfectessay essay sample_harvard_style_1David Smith
 

More from David Smith (14)

Perfectessay.net term paper sample #1 mla style
Perfectessay.net term paper sample #1 mla stylePerfectessay.net term paper sample #1 mla style
Perfectessay.net term paper sample #1 mla style
 
Perfectessay.net term paper sample #2 apa style
Perfectessay.net term paper sample #2 apa stylePerfectessay.net term paper sample #2 apa style
Perfectessay.net term paper sample #2 apa style
 
Perfectessay.net term paper sample #1 apa style
Perfectessay.net term paper sample #1 apa stylePerfectessay.net term paper sample #1 apa style
Perfectessay.net term paper sample #1 apa style
 
Perfectessay.net coursework sample #1 mla style
Perfectessay.net coursework sample #1 mla stylePerfectessay.net coursework sample #1 mla style
Perfectessay.net coursework sample #1 mla style
 
Perfectessay.net coursework sample #2 apa style
Perfectessay.net coursework sample #2 apa stylePerfectessay.net coursework sample #2 apa style
Perfectessay.net coursework sample #2 apa style
 
Perfectessay.net research paper sample #6 apa style
Perfectessay.net research paper sample #6 apa stylePerfectessay.net research paper sample #6 apa style
Perfectessay.net research paper sample #6 apa style
 
Perfectessay.net research paper sample #4 apa style
Perfectessay.net research paper sample #4 apa stylePerfectessay.net research paper sample #4 apa style
Perfectessay.net research paper sample #4 apa style
 
Perfectessay.net research paper sample #2 apa style
Perfectessay.net research paper sample #2 apa stylePerfectessay.net research paper sample #2 apa style
Perfectessay.net research paper sample #2 apa style
 
Perfectessay.net research paper sample #1 apa style
Perfectessay.net research paper sample #1 apa stylePerfectessay.net research paper sample #1 apa style
Perfectessay.net research paper sample #1 apa style
 
Perfectessay.net essay sample #2 chicago style
Perfectessay.net essay sample #2 chicago stylePerfectessay.net essay sample #2 chicago style
Perfectessay.net essay sample #2 chicago style
 
Perfectessay.net essay sample #1 chicago style
Perfectessay.net essay sample #1 chicago stylePerfectessay.net essay sample #1 chicago style
Perfectessay.net essay sample #1 chicago style
 
Perfectessay.net essay sample #2 apa style
Perfectessay.net essay sample #2 apa stylePerfectessay.net essay sample #2 apa style
Perfectessay.net essay sample #2 apa style
 
Perfectessay essay sample_harvard_style_2
Perfectessay essay sample_harvard_style_2Perfectessay essay sample_harvard_style_2
Perfectessay essay sample_harvard_style_2
 
Perfectessay essay sample_harvard_style_1
Perfectessay essay sample_harvard_style_1Perfectessay essay sample_harvard_style_1
Perfectessay essay sample_harvard_style_1
 

Recently uploaded

On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17Celine George
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxUmeshTimilsina1
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...Nguyen Thanh Tu Collection
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxPooja Bhuva
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxCeline George
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Pooja Bhuva
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Pooja Bhuva
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 

Recently uploaded (20)

On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 

Perfectessay.net coursework sample #4 apa style

  • 1. Summary 1 Running head: SUMMARY Summary [Author’s Name] [Tutor’s Name] [Class]
  • 2. Summary 2 Abstract Computer forensics emerged as a scientific response to the increased used of computers and information technologies, as well as the legal response to the growing number of crimes involving computer and information solutions. A whole set of legal and administrative laws and guidelines govern computer forensics, but the USA Patriot Act is fairly regarded as the first and probably, the major legal aspect of computer forensics today. In his article, Null (2005) provides a detailed observation of what computer forensics is and how the USA Patriot Act refers to the current system of computer forensics principles.
  • 3. Summary 3 Summary Computer forensics emerged as a scientific response to the increased use of computers and information technologies, as well as the legal response to the growing number of crimes involving computer and IT solutions. A whole set of legal and administrative laws and guidelines govern computer forensics, but the USA Patriot Act is fairly regarded as the first and probably, the major legal driver of computer forensics today. In his article, Null (2005) provides a detailed observation of what computer forensics is and how the USA Patriot Act governs the current system of principles in computer forensics. According to Null (2005) in 2004 alone companies reported more than $377 million losses because of computer related crimes. Given that more and more courts turn to computers and information as the major sources of evidence in criminal cases, computer forensics is gradually becoming the key element of successful crime investigation. Generally, computer forensics is defined as “the process of scientifically examining and analyzing data anywhere from computer storage to media so that the data can be used as evidence in court” (Null, 2005). Computer forensics involves a range of computer investigation and identification processes, from extracting and preserving the data up to interpreting and presenting this data in court. Although the U.S. market for computer forensics constantly grows, there is still a shortage of professionals and experts, as well as the lack of practical experience and knowledge in different computer subjects (Null, 2005). However, not the state of science and art in computer forensics but its legality attracts special attention. In this context, Null (2005) suggests that the USA Patriot Act is “one of the most influential federal statutes to be put in place because of the use of computer forensics in law enforcement”. Null (2005) believes that the USA Patriot Act has completely changed the way professionals in computer forensics operate when gathering and interpreting digital evidence. Null (2005)
  • 4. Summary 4 asserts that sections 202 and 209 of the Patriot Act have caused the major shifts in the current professional attitudes to computer forensics. Section 202 of the USA Patriot Act makes it possible for forensic professionals to access and gather wire communications that involve voice in hacking situations (Null, 2005). As a result, this evidence can also be presented in court. By capturing wire communications, law officials can monitor and record threatening communications, which can also be used against defendants in court (Null, 2005). Null (2005) discusses section 209 of the USA Patriot Act, which changed the way and rules forensic professionals should follow to access stored voice communications. Earlier, when law authorities had to access stored voice communications with a third-party provider a wiretap order was required, while accessing voice communications on an answering machine required a search warrant; now, the term ‘electronic storage’ no longer exists, and with a search warrant officials can gain access to any kind of stored voice communications (Null, 2005). It should be noted, that the USA Patriot Act was designed to fit the legal requirements of the U.S. Constitution, namely, its Fourth Amendment. That law officials can readily gain access to Internet files and stored computer information is clear, and for this reason both the Fourth Amendment and the USA Patriot Act had to delineate forensic practices that are acceptable and unacceptable in specific crime situations. Where forensic criminals could not balance security with privacy, the USA Patriot Act had to fulfill this role (Null, 2005). As a result, both the Act and the Fourth Amendment became a kind of a legal barrier on forensic professionals’ way to evidence gathering. Unfortunately, the Patriot Act did not resolve all forensic issues: for example, forensic professionals often fail to properly document the process of gathering digital evidence or cannot trace the process of changing digital data due to its relative invisibility (Null, 2005). Nevertheless, the USA Patriot Act lays the foundation
  • 5. Summary 5 for the development of appropriate rules and guidelines necessary to manage the process of gathering and interpreting digital data for the purposes of computer forensics.
  • 6. Summary 6 References Null, J.D. (2005). Computer forensics: The modern crime fighting tool. The Journal of Computer Information Systems, 46 (2): 115-119.