Fill in Order Details

  • Submit paper details for free using our simple order form

Make Payment Securely

  • Add funds to your account. There are no upfront payments. The writer will only be paid once you have approved your paper

Writing Process

  • The best qualified expert writer is assigned to work on your order
  • Your paper is written to standard and delivered as per your instructions

Download your paper

  • Download the completed paper from your online account or your email
  • You can request a plagiarism and quality report along with your paper

Computer laws and forensics

Computer laws and forensics

Student’s Name

Affiliation

Course

Date

Q1. Appear and behave professionally: Keep hands on the table for juror to view.This gives an open truthful and confidence appearance. Sit in an upright posture and look at the questioning attorney while answering questions. Telling the whole truth and nothing but the truth to compromise ones credibility. Having a thorough knowledge of the case helps the first responder to be more confident and persuasive. Making eye contact with juror while answering the questions asked and making the juror know you’re confident. Listening carefully and ensures understanding before responding (Maras, 2012).

The witness should memorize the statement before proceedings to find inconsistency. The responder might feel combative from cross examination, making a certain outburst without waiting for objection from his attorney. This makes the juror believe the witness might have been lying all along. The defense team might have trouble cross examining the witness as lack of knowledge on the case, the responder might feel agitated and lack consistency in answering the forwarded question. Witness might be vaguely informed on how to address the judge. During cross examination the responder might not be able to differentiate answers of leading, rapid and compound questions.

Q2.An expert collects tests and evaluates evidence forming an opinion to communicate to the judge and jury. An expert may be used either for consulting or testimony. The consulting expert acts as an employee in case of litigation or trial but does not stand trial, as opposed to testimonial expert. The experts are vetted on, skills, academic education, experience and professional training. Examples of some IT certifications are certified fraud examiners C.F.E: They are professionals who denote and indicate frauds and fraud risk.They combine knowledge of financial transactions with an understanding of methods and laws of how to solve allegations of fraud. CFEs analyze financial records to determine whether they have been manipulated (Maras, 2012). .CFEs is best suited in forensic accounting. Certified System Analyst: This is a profession I.T expert, with knowledge and experience in computer systems and corporate information technology. This is dependent on the case as per the court.

Most judges have in house experts who are under the judiciary payroll to increase reliability. An expert witness fee is paid as per arrear of expertise according to Expert witness fee guide. An expert charge more while testifying on trial and deposition. This will also range as per the experienced acquired over the years. Expert witness deposition requires advanced payment of 48% from opposing counsel. The median minimal charge for all experts was 3 hours for deposition and 4 hours for trial.

The Certified system analyst is an expert who defines an organizational I.T needs. He develops software and technology departments as well as showing departments on how to best use hardware and software. A Certified system analyst has a Certified Information Systems Security Professional (CISSP) Accreditation to increase valuation analyst, he has knowledge in developing and designing enterprise solutions by using Microsoft. The Certified Fraud examiner is issued by the Associating of certified fraud examiners. This is the world’s largest anti-fraud organization. The CFE is a professional course that requires constant education such as the Certified Public Accountant. They possess knowledge in all aspects of anti-fraud profession.

Evidence can be presented physically, intangible or direct, regardless of the evidence type its presentation in court is done through witness’s person testifying under oath. Such is the case for a Certified Fraud examiner whose understanding and knowledge on forensic accounting is critical in a case that is associated with fraud in financial transactions. According to Brad coopers case in April 9, 2013, Brad was found guilty in May 2011 for first degree murder. In their defense they had two witnesses who were revoked by the judge but due to career expertise qualified him to explain the data. This is an example of a case where expertise is what determines if one is a forensics examiner.

Q3. Children start learning the use of computers at very early stages of their life. Knowledge of computer will help one to converse with children on various harms on the internet. Strategically place the computer in a high traffic area such as the living room as it enables one to periodically check out what your child is doing. Make times and set rules for using the computer. Assessing and teaching children to be assertive protects them from internet predators when one is not are around. Employ proper software programs that filter the sites that are inappropriate.

By Educating parents on the dangers of internet access at early age gives one an open mind to read on the cybercrimes and be a step ahead of the cyber terrorists. Use a fire wall: They monitor traffic between computer and the internet and act as a wall of defense keeping away intruders. Securing wireless network: Hackers can have access to data of unsecured lines. Use of strong password helps to secure information. It is advisable to encrypt passwords so as to set up for people with passwords. Using comprehensive security software updates the operating system and keeps the computer safe as well as assists in preventing and protecting the computer from malware, phishing and spyware.

Establishing ground rules for online use thus; Email access links are sent with spam and can spread a worm in your operating system. Some viruses replicate and spread through your computer thus one has to be cautious. When a child uses instant messaging one need to learn the lingos.Understanding that almost everything is written in code, this will make it easier for you to know what is going on in chat rooms. Also remember that webcams are the best tools for online sexual predators.

Q4. The use of identity fraud insurance protection and payment protection insurance enables clients to be covered in case of an identity theft or harassment from individual. It secures one with policies that enable implementation of fast tracking of the fraudsters. The use of Identity fraud ensures that credit balance is checked at all times, on accounts as well as transaction statements. The use of payment protection insurance is to cover the damages received after the incident of identity theft for a period of one year (Vacca, 2005).

Use of firewall and ant viruses: This are tools used to minimize online and identity theft on online data. To protect one against electronic identity theft by phishing or hacking, malware users are advised to maintain computer security by updating Operating systems, antivirus and web browser security.

Comparison and contrast are indicated below;

Identity Fraud Insurance protection Use of firewall and antiviruses

It ensures that after incident has occurred there is adequate cover It assist in prevention of fraudsters from accessing personal information

It is mainly long term as it is a policy that covers the whole year It Is long term depending on the frequency of updating the operating system and antivirus

It is relative expensive as compared to using firewalls and antivirus It is cheaper because it requires minimal maintenances

Antivirus automatically updates itself with the latest threat and, cures and repairs damaged content automatically when malware is encountered. It contains a real time scanner to intercept malware and scheduled scanner which automatically performs the scan. Some other features include: webmail protection, instant messaging protection, automatic virus and program update on demand scanner. The fire wall can be a software or hardware application device that acts as a buffer between your computer and the internet. They have features that configure certain types of information being transmitted in the internet.

Using identity fraud insurance protection covers the cost of salvaging the mess however; payment protection insurance caters for the damages caused. The accolades and awards received by various anti-virus firms show protection against cyber terrorist, and Identity fraud phishing as well as hacking. Example is McAfee was awarded best advanced persistent threat protection and is a SC Magazine award finalist as the best database security solution (Vacca, 2005).

Reference

Maras, H. (2012). Computer forensics: Cybercriminals, laws, and evidence. (p. 379 pages). United Kingdom: Jones & Bartlett Publishers.

Vacca, J. (2005).Computer forensics: Computer crime scene investigation, volume 1. (illustrated ed.). United States of America: Cengage Learning.

WHAT OUR CURRENT CUSTOMERS SAY

  • Google
  • Sitejabber
  • Trustpilot
Zahraa S
Zahraa S
Absolutely spot on. I have had the best experience with Elite Academic Research and all my work have scored highly. Thank you for your professionalism and using expert writers with vast and outstanding knowledge in their fields. I highly recommend any day and time.
Stuart L
Stuart L
Thanks for keeping me sane for getting everything out of the way, I’ve been stuck working more than full time and balancing the rest but I’m glad you’ve been ensuring my school work is taken care of. I'll recommend Elite Academic Research to anyone who seeks quality academic help, thank you so much!
Mindi D
Mindi D
Brilliant writers and awesome support team. You can tell by the depth of research and the quality of work delivered that the writers care deeply about delivering that perfect grade.
Samuel Y
Samuel Y
I really appreciate the work all your amazing writers do to ensure that my papers are always delivered on time and always of the highest quality. I was at a crossroads last semester and I almost dropped out of school because of the many issues that were bombarding but I am glad a friend referred me to you guys. You came up big for me and continue to do so. I just wish I knew about your services earlier.
Cindy L
Cindy L
You can't fault the paper quality and speed of delivery. I have been using these guys for the past 3 years and I not even once have they ever failed me. They deliver properly researched papers way ahead of time. Each time I think I have had the best their professional writers surprise me with even better quality work. Elite Academic Research is a true Gem among essay writing companies.
Got an A and plagiarism percent was less than 10%! Thanks!

ORDER NOW

CategoriesUncategorized

Consider Your Assignments Done

“All my friends and I are getting help from eliteacademicresearch. It’s every college student’s best kept secret!”

Jermaine Byrant
BSN

“I was apprehensive at first. But I must say it was a great experience and well worth the price. I got an A!”

Nicole Johnson
Finance & Economics

Our Top Experts

See Why Our Clients Hire Us Again And Again!


OVER

10.3k
Reviews

RATING
4.89/5
Average

YEARS
13
Mastery

Success Guarantee

When you order form the best, some of your greatest problems as a student are solved!

Reliable

Professional

Affordable

Quick

Using this writing service is legal and is not prohibited by any law, university or college policies. Services of Elite Academic Research are provided for research and study purposes only with the intent to help students improve their writing and academic experience. We do not condone or encourage cheating, academic dishonesty, or any form of plagiarism. Our original, plagiarism-free, zero-AI expert samples should only be used as references. It is your responsibility to cite any outside sources appropriately. This service will be useful for students looking for quick, reliable, and efficient online class-help on a variety of topics.