Digital Forensics

Read Complete Research Material

DIGITAL FORENSICS

Electronic security and Digital forensics

Electronic security and Digital forensics

Introduction

The Internet is experiencing explosive growth, as the number of crimes against or using computers. In response to the growth of computer crime in the area of computer forensics has emerged. Computer forensics involves collection and careful analysis of electronic evidence that not only assesses the damage to a computer following an electronic attack, but also to recover lost data from such a system to execute a criminal. With the growing importance of computer security today and severity of cyber crime, it is important for IT professionals who understand the technology used in computer forensics. This article will discuss the need for computer forensics to be practiced effectively and legally. It promotes the idea that competent computer forensics training and awareness of applicable laws is essential for today?

Research Design

Since the 1990s, security and policing strategies have evolved into more senior intelligence-led and proactive. Their effective use is often considered an essential tool to inform decision making at a strategic and tactical level, for example, to fight against terrorism and to deploy resources appropriately police. In particular, criminal intelligence is now widely implemented in organizations and law enforcement through technologies such as databases, geographic information systems, techniques of data mining, biometric security devices and so on.

Beyond the successfully recognized databases of identification such as DNA or AFIS, it is clear that the data forensic cases could contribute more meaningfully to the provision of intelligence: it is recurrent discovered a posteriori that all necessary information was already in the record and could be used proactively to resolve the case before. This weakness is generally recognized, the implementation of solutions effectively capitalize on the intelligence that can be derived from case data showed to be very difficult, to say nothing of forensic data, even if it is demonstrated a posteriori, it is one of the strongest type of evidence-based information because of its material.

Methodology

Computer Forensics As technology has progressed, computers have become incredibly powerful. Unfortunately, as computers become more sophisticated, such as crimes committed in them. Distributed Denial of Service, and other ILOVEYOU virus, domain name hijacking, Trojan horses, and the closure of the site lies some hundreds of types of documents generated by computer from attacks against other computers . Managers of information systems must understand computer forensics. Forensics is the process of using scientific knowledge for collecting, testing, and presenting evidence in court. Forensics deals primarily in the recovery and analysis of latent evidence. Concealed evidence can take many forms, from fingerprints left on a window on DNA evidence recovered from bloodstains files on the hard disk. Computer forensics can be used to uncover evidence of potential in many types of cases, including, for example? Industrial espionage copyright piracy, money laundering offense of sexual harassment of intellectual property theft, unauthorized access to confidential data information? Blackmail? Corruption? Decryption? Destruction of information? Fraud? Software illegal copying of three main steps of computer forensics is the acquisition, validation and analysis of ...
Related Ads