Examine the verification process known as hashing


Assignment:

Prior to beginning work on this discussion, read all of required resources.

Evidence verification is paramount for establishing legal cases against cyber criminals during digital forensic investigations. The verification process is essential in maintaining the integrity of digital evidence.

For this discussion, you will examine the verification process known as hashing.

In your post, you must

  1. Explain the process of hashing and why it is important to digital forensic investigations.
  2. Analyze the technical aspects of hashing as they relate to mediums such as computers or removable storage devices.
  3. Explain why hashing is vital to forensic investigations as a method of analyzing data.
  4. Evaluate the legal issues that can potentially arise from hashing.

Required Resources

Text

Holt, T. J., Bossler, A. M., & Seigfried-Spellar, K. C. (2018). Cybercrime and digital forensics: An introduction (2nd ed.).

Chapter: Evolution of Digital Forensics

Chapter: Acquisition and Examination of Forensic Evidence

Article

Cohen, C. L. (2007). Growing challenge of computer forensics. The Police Chief: The Professional Voice of Law Enforcement, 74(3).

This article examines some of the issues related to the investigation of cyber crimes and computer forensics. It will assist you in the development of discussion post.

Geraghty, M. (2007). The technical aspects of computer-facilitated crimes against children. The Police Chief: The Professional Voice of Law Enforcement, 74(3).

This article analyzes the technical aspects of cyber crime as it relates to children. It will assist in the development of discussion post.

McHenry, J. & Gorn, M. (2016). Digital forensic examination: A case study. FBI Law Enforcement Bulletin, 1, 1-3.

The full-text version of this article is available through the EBSCOHost database in the University of Arizona Global Campus Library. The authors examine a digital forensic examination case study pertaining to cyber crimes against children. It will assist you in the development of discussion posts.

Recommended Resources

Text

Holt, T. J., Bossler, A. M., & Seigfried-Spellar, K. C. (2018). Cybercrime and digital forensics: An introduction (2nd ed.). New York: Routledge.

Chapter: Cybercrime and criminological theories

Articles

Bell, A. E. (2007). Investigating international cybercrimes. The Police Chief, 74(3).

This article examines various aspects of the investigation of global cyber crimes. It may assist you in the development of this week's activities.

Websites

MSCJ Professional Sources

This resource site will provide assistance in researching additional sources for the assessments within this course.

Solution Preview :

Prepared by a verified Expert
Business Law and Ethics: Examine the verification process known as hashing
Reference No:- TGS03205414

Now Priced at $30 (50% Discount)

Recommended (92%)

Rated (4.4/5)