CSCI 511 Liberty University Digital Forensics Discussion

Question Description

I’m working on a science discussion question and need support to help me learn.

Having Trouble Meeting Your Deadline?

Get your assignment on CSCI 511 Liberty University Digital Forensics Discussion  completed on time. avoid delay and – ORDER NOW

replies of at least 250 words each by 11:59 p.m. (ET)on Sunday of the same module. All assertions in the thread and replies must besupported by course materials, good examples, thoughtful analysis, and at least1 scholarly resource in the thread, in addition to at least 1 scholarlyresource in one of the replies. There must also be an appropriate incorporationof Judeo-Christian worldview/analysis and biblical principles. All sources mustbe cited in current APA format. Blake post- Code of conduct requirements should absolutely be upheld by forensic professionals in order to maintain proficiency in the field. In fact, most professions have their own standards and codes of conduct that require continuing education. I believe IT and healthcare are the main professions that require this due to the fact that these fields are forever changing. Just imagine if healthcare professionals only knew the information/procedures that were available 50 years ago vs. today. Right, it’s scary to think about. The same goes for information technology, especially digital forensics. The main biblical case that I will make here is that digital forensic professionals need to remain very ethical in the way they do their evidence gathering and their reports. This is why the requirements of the code of ethics that set standards of conduct for their profession should apply to them. This involves continuing education, attending conferences, etc.

As stated in the Bible in Colossians 3:17 (ESV), “and whatever you do, whether in word or deed, do it all in the name of the Lord Jesus, giving thanks to God the Father through him.” This verse relays why it is important that anything we do in life, do it in the name of our Lord. Ethics is a big part of the Bible, just think of the ten commandments. A code of ethics should set standards for a profession that deals with legal issues from extracting data to testifying in court. Tampering with data is a big concern and challenge that forensic analysts deal with. This could cause wrongful incrimination of an innocent person as well as legal issues against the forensic analyst if data is found to be altered by their own doing. In fact, according to Seigfried-Spellar, Rogers & Crimmins, “a set of standards would be necessary to continue to utilize computer evidence in the criminal justice system” (2017). The main way to make sure that digital forensic analysts remain professional is to require a code of ethics requiring continuing education and like-minded collaboration. This could be debatable, but this profession needs to be the most ethical out there today.

References:

Seigfried-Spellar, K., Rogers, M., & Crimmins, D. (2017). Development of a Professional code of Ethics in Digital Forensics. (p. 136). West Lafayette: Annual ADFSL Conference on Digital Forensics, Security and Law. Retrieved from https://commons.erau.edu/cgi/viewcontent.cgi referer=&httpsredir=1&article=1380&context=adfsl. Matthew post- In Proverbs 8: 13, NIV, scripture states, “Blessed are those who find wisdom, those who gain understanding.” This teaching is not only useful in terms of learning in our daily lives, but this is especially true in the fields of cyber security and digital forensics. As software companies have become more knowledgeable about digital forensics and investigations, they have created more tools to keep up with technology (Nelson B, et al.). With this in mind, agencies such as the International Standards Organization and National Institute of Standards and Technologies (NIST) have created global standards that are meant to assist individuals processing and gathering digital evidence (Vidal C., et al). NIST also provides a set of guidelines and practices for digital forensics that would be helpful for any business to implement. Along with these standards and guidelines, there are frameworks of digital forensic readiness that we should look to in maintaining our ability to investigate digital security incidents. Digital forensic readiness can be described as the ability to respond quickly and in the most minimally invasive way to a business when collecting digital evidence for security incidents. Keeping up with the current standards and tools that are available for digital forensic investigations is a must in maintaining a high digital forensic readiness. It can be stated that there is a need to train a companies digital forensic and data preservation teams as well as their general staff and that a lack of training implies that a company is not digitally forensically ready (Adel, A.). These are only some of the many reasons why continuing education is important; there is a vast amount of tooling, forensic methodologies, laws and frameworks that would be difficult to fully be aware of without education. Codes of Ethics can be described as a set of principles and standards that professionals in a field should follow and be judged. So, in considering a codes of ethics for digital forensics, I believe it would be pertinent, wise, and biblically sound for us to place continual education as a high priority. If we do not uphold this value as a core part of those standards, we risk losing our skills as newer technologies and threat vectors are developed and our ability to remain credible to other professionals in the field will suffer.

Resources:
Adel, A. (2022). A Conceptual Framework to Improve Cyber Forensic Administration in Industry 5.0: Qualitative Study Approach. Forensic Sciences, 2(1), 111–129. https://doi.org/10.3390/forensicsci2010009

Nelson, B., Phillips, A., & Steuart, C. (2018). Guide to Computer Forensics and Investigations (6th Edition). Cengage Limited. https://mbsdirect.vitalsource.com/books/9780357298800

Vidal, C., & Choo, K.-K. R. (2015). Cloud security and forensic readiness. The Cloud Security Ecosystem, 401–428. https://doi.org/10.1016/b978-0-12-801595-7.00018-5

Order Solution Now

Similar Posts