Chat with us, powered by LiveChat

Analyze the technical aspects of hashing as they relate to mediums such as computers or removable storage devices. Explain why hashing is vital to forensic investigations as a method of analyzing data.

Words: 465
Pages: 2
Subject: Law

Data Preservation in Cyber Crime Investigations

Evidence verification is paramount for establishing legal cases against cyber criminals during digital forensic investigations. The verification process is essential in maintaining the integrity of digital evidence.

For this discussion, you will examine the verification process known as hashing.

In your post, you must

Explain the process of hashing and why it is important to digital forensic investigations.
Analyze the technical aspects of hashing as they relate to mediums such as computers or removable storage devices.
Explain why hashing is vital to forensic investigations as a method of analyzing data.
Evaluate the legal issues that can potentially arise from hashing.

Article
Cohen, C. L. (2007). Growing challenge of computer forensics (Links to an external site.). The Police Chief: The Professional Voice of Law Enforcement, 74(3). Retrieved from http://www.policechiefmagazine.org/magazine/index.cfm?fuseaction=display_arch&article_id=1136&issue_id=32007

This article examines some of the issues related to the investigation of cyber crimes and computer forensics. It will assist you in the development of this week’s discussion post.
Accessibility Statement does not exist.
Privacy Policy does not exist.
Geraghty, M. (2007). The technical aspects of computer-facilitated crimes against children (Links to an external site.). The Police Chief: The Professional Voice of Law Enforcement, 74(3). Retrieved from http://www.policechiefmagazine.org/magazine/index.cfm?fuseaction=display_arch&article_id=1137&issue_id=32007

This article analyzes the technical aspects of cyber crime as it relates to children. It will assist in the development of this week’s discussion post.
Accessibility Statement does not exist.
Privacy Policy does not exist.
McHenry, J. & Gorn, M. (2016). Digital forensic examination: A case study. FBI Law Enforcement Bulletin, 1, 1-3. Retrieved from https://leb.fbi.gov/

The full-text version of this article is available through the EBSCOHost database in the University of Arizona Global Campus Library. The authors examine a digital forensic examination case study pertaining to cyber crimes against children. It will assist you in the development of this week’s discussion posts.
Recommended Resources
Text
Holt, T. J., Bossler, A. M., & Seigfried-Spellar, K. C. (2018). Cybercrime and digital forensics: An introduction (2nd ed.). New York: Routledge.

Chapter 11: Cybercrime and criminological theories
Articles
Bell, A. E. (2007). Investigating international cybercrimes (Links to an external site.). The Police Chief, 74(3). Retrieved from http://www.policechiefmagazine.org/magazine/index.cfm?fuseaction=display_arch&article_id=1135&issue_id=32007

This article examines various aspects of the investigation of global cyber crimes. It may assist you in the development of this week’s activities.
Accessibility Statement does not exist.
Privacy Policy does not exist.
Websites
MSCJ Professional Sources (Links to an external site.). (http://ashford-mscj.weebly.com/)

This resource site will provide assistance in researching additional sources for the assessments within this course.
Go to top of page