wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

CYBER FORENCIS: PAST, PRESENT AND FUTURE.

profile
44_Rohit Sharma
Mar 14, 2022
0 Likes
0 Discussions
161 Reads

Cyber Forensics is defined as the process of preservation, identification, extraction, and documentation of computer evidence which can be used by the court of law. It is a science of finding evidence from digital media like a computer, mobile phone, server, or network. It provides the forensic team with the best techniques and tools to solve complicated digital-related cases. Due to increases in attacks against systems, states, and consumer products, companies like organizations and governments have taken security more seriously.

 

Prior to the 1970s crimes involving computers were dealt with using existing laws. The first computer crimes were recognized in the 1978 Florida Computer Crimes Act, which included legislation against the unauthorized modification or deletion of data on a computer system. One of the first practical examples of digital forensics was Cliff Stoll’s pursuit of hacker Markus Hess in 1986. Since the late 1990s mobile devices have become more widely available, advancing beyond simple communication devices, and have been found to be rich forms of information, even for crime not traditionally associated with digital forensics.

 

The tools of cyber forensic investigation are X- Ways WinHex, First on Scene, Rifiuti, Pasco, Galleta/Cookie, Forensic Acquisition Utilities, NMap, Ethereal, BinText, Encrypted disk detector, MemGator. Rifiuti is a tool which helps in finding the last details of a system's recycle bin. It helps in collecting all the deleted and undeleted files. Pasco is a Latin word meaning browse.

 

We are in the digital world. We need to know who and how we are being attacked digitally. Therefore, we need to know our security, safety, and privacy features while using safe browsing. When we click on any link, be sure it is related to us and verify twice. Never respond to any email if find unusual. Business organizations need to follow IT principles. They must educate their employees on what to do if any suspicious activity is recognized. This is not for only the recognition of suspects, but they need to know what actions put them in a dangerous zone. A forensic department is required in case of failure of cybersecurity. Digital forensics help to get evidence and can be produced before a court. This evidence will punish the culprit.


Comments ()


Sign in

Read Next

Hey Aryan here

Blog banner

15 Websites that will make your life easier ...!!!

Blog banner

Direct Memory Access

Blog banner

Threads

Blog banner

10 Signs your Computer has Virus

Blog banner

Top 5 Tech Innovations of 2018

Blog banner

Multithreading in Operating System

Blog banner

The Golden Temple , Amritsar

Blog banner

Buffering

Blog banner

Memory Management

Blog banner

Full Disk Encryption on Digital Forensics

Blog banner

Deadlock in Operating System

Blog banner

Excel records

Blog banner

PYTHON

Blog banner

Sweet and Sour Mango Pickle (Gol Keri)

Blog banner

Malware

Blog banner

objectives and function of operating system

Blog banner

Meshoo

Blog banner

Process Creation

Blog banner

How India made the GIS its Own, and its Use in Infrastructural Developments

Blog banner

Virtual Memory

Blog banner

Cloud Technology and its Implications for Entrepreneurship

Blog banner

Cache memory

Blog banner

Tools to support CSI activities

Blog banner

Technical Challenges and Directions for Digital Forensics

Blog banner

Cryptanalysis tool

Blog banner

SECURITY VULNERABILITIES COUNTERMEASURES IN A SMART SHIP SYSTEM

Blog banner

LISP - Library Management System

Blog banner

Beyond the Track: Why the Best Hotel in Arcadia, Florida, Completes Your IMSA Sebring Getaway

Blog banner

File management in os

Blog banner

THE ACTORS LIFE

Blog banner

Deadlocks

Blog banner

Fudgy Tahini Date Chocolate Bars

Blog banner

INTRODUCTION

Blog banner

Everything You Need for a Perfect Stay in Arcadia, Florida, USA.

Blog banner

Pooja Silver

Blog banner

Data-Driven Prediction of Virtual Item Prices in Online Games

Blog banner

The khan mehtab transforming the modular switches company

Blog banner

Evolution of operating system

Blog banner

IOT Hacking Techniques

Blog banner

FASHION

Blog banner

The Dark Web: A Breeding Ground for Cybercriminals – How to Guard Against Threats

Blog banner