The Challenges And Opportunities Of Authentication And Recovery Of Forensic Evidence Due To Recent Technology

Read Complete Research Material



The Challenges and Opportunities of Authentication and Recovery of Forensic Evidence Due To Recent Technology

The Challenges and Opportunities of Authentication and Recovery of Forensic Evidence Due To Recent Technology

Introduction

In the current era of technology, it is necessary for the organizations and businesses to ensure the integrity and confidentiality of their business procedures by securing their confidential data. The effective security can only be done by implementing and applying the effective authentication technologies. Authentication is referred as the process of recognizing whether something or someone is authentic or not (Casey, 2011). It is often observed that, in public and private computer networks (like internet), authentication is generally done through by the utilization of logon passwords. The confirmation of the password demonstrates that the user is genuine or authentic. In addition to this, it is often observed that the organizations store their confidential information on the software and on their computer systems (Casey, 2011). In case of any vulnerable situation, the organizations and businesses may lose their important and useful data. In this scenario, it is necessary for the organizations to implement appropriate and effective technologies that may facilitate them in the recovery of their data. The proceeding paper incorporates the information regarding the challenges and opportunities of authentication and recovery of forensic evidence (Wiles & Reyes, 2011).

Discussion

Authentication of Digital Evidence

Electronic evidence or digital evidence is referred as any probative data or information that is transmitted or stored in the digital form that may be used by the people during their court cases. Before the acceptance of that digital data or digital evidence, a court usually recognizes whether the evidence is authentic or not. During the past few years, the trend of utilizing digital evidences, have been increased (Wiles & Reyes, 2011). The courts have permitted the utilization of audio files or digital video, tracks records of GPS (global positioning system), printouts of computer, computer backups, computer memory contents, databases, histories of internet browser, spreadsheets, histories of instant messages, word processing documents, logs of ATM transactions, digital photographs and emails. This record may significantly help the courts in recognizing the authentication of digital evidences (Chow & Shenoi, 2010).

According to the researches, the process of authentication of digital evidence is composed of two steps. The first step involves the examination and identification of the evidence. This may help in analyzing the claim of the proponent (Chow & Shenoi, 2010). Another step may include the analysis of the evidence. This analysis may allow the court to recognize the probative value (Wiles & Reyes, 2011). Therefore, the digital evidence has introduced new opportunities and challenges for the authentication. These opportunities may greatly strengthen and empower the verifications of reliability (Wiles & Reyes, 2011).

Technology That Facilitates Authentication

In today's world of technology, biometrics are widely used for the authentication purpose. Biometrics are referred as the automated procedure of recognizing and analyzing any individual based on the behavioral or physiological characteristics (Chow & Shenoi, 2010). The recognition technology of biometric is based on the physical distinctiveness of ...