Monday, March 9, 2020
Computer Forensics
Computer Forensics The Internet is growing explosively, as is the number of crimes committed against or using computers. As a response to the growth of computer crime, the field of computer forensics has emerged. Computer forensics involves carefully collecting and examining electronic evidence that not only assesses the damage to a computer as a result of an electronic attack, but also to recover lost information from such a system to prosecute a criminal. With the growing importance of computer security today and the seriousness of cyber crime, it is important for computer professionals to understand the technology that is used in computer forensics. This paper will discuss the need for computer forensics to be practiced in an effective and legal way. It promotes the idea that the competent practice of computer forensics and awareness of applicable laws is essential for today's organizations.Computer ForensicsAs technology has advanced, computers have become incredibly powerful.John Wilkes authored p amphlets critical of the Bri...Unfortunately, as computers get more sophisticated, so do the crimes committed with them. Distributed Denial of Service Attacks, ILOVEYOU and other viruses, Domain Name Hijacking, Trojan Horses, and Websites shut down are just a few of the hundreds of documented attack types generated by computers against other computers. Managers of information systems should understand computer forensics. Forensics is the process of using scientific knowledge for collecting, analyzing, and presenting evidence to the courts. Forensics deals primarily with the recovery and analysis of latent evidence. Latent evidence can take many forms, from fingerprints left on a window to DNA evidence recovered from bloodstains to the files on a hard drive. Computer forensics can be used to uncover potential evidence in many types of cases including, for example:à ·Copyright infringementà ·Industrial espionageà ·Money launderingà ·Piracyà ·Sexual harassmentà ·Theft of intellec tual propertyà ·Unauthorized access to confidential informationà ·Blackmailà ·Corruptionà ·Decryptionà ·Destruction of informationà ·Fraudà ·Illegal duplication of softwareThe three main steps in computer forensics are...
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.