Professional Documents
Culture Documents
Balamanikanta Aluri
Webster University
1
Introduction:
evidence. Rooted at the intersection of computer science, law, and criminal justice, cyber
forensics plays a pivotal role in the modern landscape of cybersecurity. This paper delves into
the realm of cyber forensics, employing the 5 W’s - What, Who, When, why, and Where - to
What:
The field of cyber forensics involves the systematic collection, preservation, analysis, and
(Omeleze & Venter, 2019). Its main principles revolve around maintaining the integrity of
digital evidence, ensuring the chain of custody, and adhering to legal standards and
Cyber forensic examiners are employed or contracted by various organizations, including law
enforcement agencies, government entities, corporations, and consulting firms. Their role
identifying security breaches, and providing expert testimony in court. Essential skill sets for
frameworks.
Forensic Computer Examiner (CFCE), and EnCase Certified Examiner (EnCE) are strongly
recommended for cyber forensic investigators (Alghamdi, 2021). The current market starting
2
salary for a cyber forensics investigator varies depending on factors such as location,
experience, and industry, with average salaries ranging from $60,000 to $100,000 annually.
Who:
Entities hiring cyber forensics examiners include law enforcement agencies such as the FBI,
Homeland Security, and state police departments, as well as private sector organizations like
institutes, and professional organizations offer cyber forensic training and education
programs catering to individuals aspiring to enter this field or enhance their skills.
Applicants for cyber forensics positions comprise a diverse pool of professionals, including
forensic analysts.
When:
such as hacking, data breaches, intellectual property theft, fraud, and cyber espionage.
Investigations may also occur in response to incidents like employee misconduct, policy
violations, and civil litigation. The actions of a cyber forensic investigator may be called into
question, disallowing the admission of digital evidence, when protocols are not followed,
Why:
mitigation of cyber threats, thereby safeguarding digital assets, privacy, and critical
infrastructure. Certified cyber forensic examiners instil trust in the integrity of digital
evidence and enhance the credibility of legal proceedings. The Daubert standard, which
3
evaluates the admissibility of scientific evidence in court, is crucial in ensuring the reliability
Where:
Cyber forensics finds applications across various industries and professions, including law
security.
One notable case illustrating the application of cyber forensics is the investigation into the
2014 Sony Pictures Entertainment hack. Cyber forensic processes were instrumental in
identifying the perpetrators, analysing the malware used in the attack, and tracing the digital
digital assets, and upholding the rule of law in the digital age. Its interdisciplinary nature,
coupled with advancements in technology and evolving legal frameworks, underscores its
investigations.
4
References
Omeleze, S., & Venter, H. S. (2019). Digital forensic application requirements specification