wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Study on cyber and network forensic in computer security management

profile
16_Abhay Kamble
Mar 14, 2022
0 Likes
0 Discussions
109 Reads

We are living in a world of technology 
where computers are being used every day
from personal use, social interaction to 
business wise. Most storage medium of 
information relies on electronic devices like 
hard disks and flash, as well as cloud 
storage. Also the trending of smartphone 
usage nowadays also increases the risk of 
cybercrime as most transactions and 
communication online is done over 
smartphones. That poses vulnerabilities to 
attackers online to steal information such 
passwords, credit and bank credentials, 
etc.
The paper will then highlight basics 
associated with computer and network 
security. Also information beneficial to 
prosecutors as well as Law enforcement on 
the guidelines and procedures for making 
use of digital evidence as well as obtaining 
it. Also to ensure the collected evidence 
information is made admissible to be used in court. The paper will generalize on the 
world of forensics and how it all works.


Comments ()


Sign in

Read Next

Session Hijacking

Blog banner

All you need to know about “Off-page SEO”

Blog banner

Why Skipping Afternoon Meals Affects More Than Just Your Hunger?

Blog banner

Socket Programming in Java

Blog banner

Why Seasonal Summer Foods Are Best for Your Health?

Blog banner

Junk food vs healthy food

Blog banner

An Approach To Spyware Detection And Removal

Blog banner

Women empowerment

Blog banner

Ethical Hacking

Blog banner

Latest Email Marketing Techniques

Blog banner

Deadlock

Blog banner

Security issues

Blog banner

Virtual memory

Blog banner

Why Meal Maharaj Prioritises Seasonal Vegetables in Every Meal Box

Blog banner

?How long does wisdom tooth pain last?

Blog banner

Metasploit

Blog banner

Loneliness

Blog banner

Software

Blog banner

What is Amazon?

Blog banner

A book review

Blog banner

Simple STEM Activities for Toddlers That Spark Curiosity

Blog banner

Memory Management

Blog banner

File management

Blog banner

Security and E-mail

Blog banner

SECURITY VULNERABILITIES COUNTERMEASURES IN A SMART SHIP SYSTEM

Blog banner

Veg/Non-veg/Egg Tiffin Meals That Are Nutritious and Filling

Blog banner

Service Validation and Testing during the Design Phase

Blog banner

Man In The Middle Attack

Blog banner

bulk email software

Blog banner

LISP - Library Management System

Blog banner

Texting is actually better than talking in person

Blog banner

CYBER SECURITY CHALLENGES

Blog banner

SESSION HIJACKING

Blog banner

IOT Hacking Techniques

Blog banner

Deadlock

Blog banner

The Memory Hierarchy

Blog banner

Population

Blog banner

Deadlock and starvation

Blog banner

Top 5 Post-Wedding Skin Care Tips

Blog banner

How to feel Happy everyday day

Blog banner

Tableau

Blog banner

Is it important to follow all the trends that come up on social media?

Blog banner