This essay has been submitted by a student. This is not an example of the work written by professional essay writers.
Uncategorized

Generic Computer Forensic Investigation Model (GCFIM)

Pssst… we can write an original essay just for you.

Any subject. Any type of essay. We’ll even meet a 3-hour deadline.

GET YOUR PRICE

writers online

 

 

 

Generic Computer Forensic Investigation Model (GCFIM)

Name of Student

Institute Affiliation

Course

Supervisor

Due Date

 

 

 

 

 

 

 

 

 

Generic Computer Forensic Investigation Model (GCFIM)

Generic Computer Forensic Investigation Model (GCFIM) main purpose is to give a beginning point when it comes to dealing with computer crime cases. It is applicable in every scene. This helps when choosing the right tool to use for the computer crime investigation. This model’s phases are five, which take the investigators through a systematic way of investigating. The first phase is the pre-process, which involves all the processes required before the actual investigation and data collection begins (Yusoff et al., 2011). The second phase is the acquisition and preservation, where the data is identified, acquired, collected, transported, stored, and preserved.

The third phase is the analysis, which is the focus of a computer forensic investigation. It is the longest process among the phases and performed intending to seek out the crime source. The fourth phase is the presentation. The finding from the analysis stage is documented and presented to the authority in a manner that can be well understood. The final phase is the post-process where the investigation is properly closed, and all the digital and physical evidence is given back to its owner.

I agree with the author’s thoughts about the model being more efficient than the others because the investigation model was designed specifically for an investigator to go back to the previous phase easily. The model does not cancel out that the investigator can face changeable situations regarding the crime scenes, used tools, and skill levels (Ninkyhade, 2018). It is more flexible than the other models, which is an advantage of increasing criminal activity numbers.

 

 

References

Yusoff, Y., Ismail, R., & Hassan, Z. (2011). Common phases of computer forensics investigation models. International Journal of Computer Science & Information Technology (IJCSIT), 3(3). Retrieved from http://airccse.org/journal/jcsit/0611csit02.pdf

Ninkyhade. (2018, August 29). Model Investigasi pada Paper: “Common Phases of Computer Forensics Investigation Models.” Retrieved August 07, 2020, from https://mappesona.me/2015/06/10/model-investigasi-pada-paper-common-phases-of-computer-forensics-investigation-models/

 

 

 

  Remember! This is just a sample.

Save time and get your custom paper from our expert writers

 Get started in just 3 minutes
 Sit back relax and leave the writing to us
 Sources and citations are provided
 100% Plagiarism free
error: Content is protected !!
×
Hi, my name is Jenn 👋

In case you can’t find a sample example, our professional writers are ready to help you with writing your own paper. All you need to do is fill out a short form and submit an order

Check Out the Form
Need Help?
Dont be shy to ask