Essay on Types of Forensics

1918 Words 8 Pages
Forensics, by and large, is the application of science to the legal process. It is an emerging research domain in India. There are many different types of forensic sciences baring their vital presence possibly in every field of human endeavor. Of these, let us now discuss about the computational, cyber and the DNA forensics.

The development of computational methods or mathematical and software techniques to solve forensic issues is called computational forensics. These methods analyze the evidence beyond human cognitive ability. They scrutinize a large volume of data, which is at any case impossible for a human mind to figure out. In spite of this, we can’t say that these techniques alone would serve
…show more content…
In this type of cases, they employ techniques such as predicting the core point of finger - print, usually the center in the finger around which the ridges flow. By this, they guess from which part of the finger it came from and thus orient the print for further analysis. Usually, this sought of examination provides them with three kinds of results namely individualization (where there are strong evidences to confirm the identity of the suspect), exclusion (where they are unlikely to confirm who the suspect is and rely on elimination by which few possibilities are ruled out) and inconclusive (where they are in a dilemma). This categorization is not only limited to computational forensic scientists. These are the areas which any forensic scientist will experience in his life – time.

Cyber forensics is also known as computer forensics, which is a kind of digital forensics, or forensic information technology. It is usually the process of extracting lost (or) manipulated data from the computer storage media. They help in maintaining information security and also protect corporate assets. It deals with intensive data analysis. Electronic evidences are fragile and can easily be modified. Additionally, cyber thieves, criminals, and dishonest employees hide, wipe, disguise, cloak, encrypt and destroy evidence from storage media. In order to prevent these and analyze every possibility, cyber

Related Documents