wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

CYBER FORENCIS: PAST, PRESENT AND FUTURE.

profile
44_Rohit Sharma
Mar 14, 2022
0 Likes
0 Discussions
161 Reads

Cyber Forensics is defined as the process of preservation, identification, extraction, and documentation of computer evidence which can be used by the court of law. It is a science of finding evidence from digital media like a computer, mobile phone, server, or network. It provides the forensic team with the best techniques and tools to solve complicated digital-related cases. Due to increases in attacks against systems, states, and consumer products, companies like organizations and governments have taken security more seriously.

 

Prior to the 1970s crimes involving computers were dealt with using existing laws. The first computer crimes were recognized in the 1978 Florida Computer Crimes Act, which included legislation against the unauthorized modification or deletion of data on a computer system. One of the first practical examples of digital forensics was Cliff Stoll’s pursuit of hacker Markus Hess in 1986. Since the late 1990s mobile devices have become more widely available, advancing beyond simple communication devices, and have been found to be rich forms of information, even for crime not traditionally associated with digital forensics.

 

The tools of cyber forensic investigation are X- Ways WinHex, First on Scene, Rifiuti, Pasco, Galleta/Cookie, Forensic Acquisition Utilities, NMap, Ethereal, BinText, Encrypted disk detector, MemGator. Rifiuti is a tool which helps in finding the last details of a system's recycle bin. It helps in collecting all the deleted and undeleted files. Pasco is a Latin word meaning browse.

 

We are in the digital world. We need to know who and how we are being attacked digitally. Therefore, we need to know our security, safety, and privacy features while using safe browsing. When we click on any link, be sure it is related to us and verify twice. Never respond to any email if find unusual. Business organizations need to follow IT principles. They must educate their employees on what to do if any suspicious activity is recognized. This is not for only the recognition of suspects, but they need to know what actions put them in a dangerous zone. A forensic department is required in case of failure of cybersecurity. Digital forensics help to get evidence and can be produced before a court. This evidence will punish the culprit.


Comments ()


Sign in

Read Next

Answer

Blog banner

AutoML: The Future of Automated Data Science

Blog banner

Yoga in INDIA and ABROAD

Blog banner

Multiple processor scheduling

Blog banner

ZOHO

Blog banner

Number Guessing game --lisp

Blog banner

Tableau

Blog banner

10 Interesting Facts about Death Note

Blog banner

ADD A SPICE TO YOUR LIFE.

Blog banner

How Cyber Forensics use in AI

Blog banner

Real time scheduling

Blog banner

Deadlock

Blog banner

PERSONALITY DEVELOPMENT

Blog banner

MY MOST THRILLED TREK ..... BHAIRAVGAD

Blog banner

Ethical Hacking

Blog banner

The Psychology of Diversity, Equity & Inclusion: How Inclusive Workplaces Boost Productivity

Blog banner

E-learning

Blog banner

First-Order Logic (FOL): The Foundation of Modern Logic

Blog banner

Hello World

Blog banner

The Impact of Cyber Forensics on Corporate Governance and Compliance

Blog banner

Internet of Things and cyber security

Blog banner

"Mahakali cave"

Blog banner

Virtual Machine's

Blog banner

How to Encrypt and Decrypt Using GNU PGP

Blog banner

Models of Information Security.

Blog banner

The Future of Cybersecurity: Trends, Challenges, and Strategies

Blog banner

IoT Architecture Based Security

Blog banner

Maharashtrian culture: Tradition, Art, Food

Blog banner

Direct Memory Access

Blog banner

Os Virtual Memory

Blog banner

Top 10 Logos and their meanings

Blog banner

10 Unsolved Mysteries all over the world

Blog banner

Data Science in Healthcare: Predicting Diseases

Blog banner

Memory management

Blog banner

How Do I Get Rid of My People-Pleasing Behaviour?

Blog banner

Demystifying Cryptography: A Beginner's Guide

Blog banner

Threat management

Blog banner

Revolutionary AI Tool: ChatGPT

Blog banner

Device driver

Blog banner

To travel is to live

Blog banner

Memory Management

Blog banner

Twisted world

Blog banner