wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Study on cyber and network forensic in computer security management

profile
16_Abhay Kamble
Mar 14, 2022
0 Likes
0 Discussions
108 Reads

We are living in a world of technology 
where computers are being used every day
from personal use, social interaction to 
business wise. Most storage medium of 
information relies on electronic devices like 
hard disks and flash, as well as cloud 
storage. Also the trending of smartphone 
usage nowadays also increases the risk of 
cybercrime as most transactions and 
communication online is done over 
smartphones. That poses vulnerabilities to 
attackers online to steal information such 
passwords, credit and bank credentials, 
etc.
The paper will then highlight basics 
associated with computer and network 
security. Also information beneficial to 
prosecutors as well as Law enforcement on 
the guidelines and procedures for making 
use of digital evidence as well as obtaining 
it. Also to ensure the collected evidence 
information is made admissible to be used in court. The paper will generalize on the 
world of forensics and how it all works.


Comments ()


Sign in

Read Next

AIS & ANN based Malware detection for Android OS - Nupur Bhatt

Blog banner

Uniprocessor Scheduling

Blog banner

“CONSISTENCY” in Social Media Marketing

Blog banner

Elements and Principles of Photography

Blog banner

Getting to Kashmir: Alternative to the Jammu-Srinagar highway

Blog banner

What is Packet Filtering?

Blog banner

A little bit of salt is all the hash needs!

Blog banner

Virtual Memory

Blog banner

Why Soft Skills Matter as Much as Grades?

Blog banner

Big Data Architecture

Blog banner

Deadlocks in Operating Systems

Blog banner

Full Disk Encryption

Blog banner

Wiretapping

Blog banner

My First Dream Bike

Blog banner

How Men and Women Process Pain Differently

Blog banner

Clustering Techniques

Blog banner

The Five Steps of Data Science

Blog banner

Data Lakes: A Key to Modern Data Management

Blog banner

Dangers of Using Public WiFis

Blog banner

Severe landslides continue to cause concern in Joshimath, Uttarakhand

Blog banner

KAHAWA TEA

Blog banner

25 Movies to Watch Post Breakup Blues

Blog banner

The Role of Frontline Managers in Driving Workplace Performance and Customer Satisfaction

Blog banner

Virtual Machine

Blog banner

IoT Evolution

Blog banner

MY FIRST BLOG?

Blog banner

MODERN OPERATING SYSTEMS

Blog banner

Health and fitness in technology

Blog banner

Child labour

Blog banner

Visualization in Data Science

Blog banner

OPERATING SYSTEM

Blog banner

Zomato's Secret Digital Marketing Techniques!

Blog banner

What is OS Fingerprinting?

Blog banner

GIS Topography

Blog banner

Perfect Moments to Wear a Rich Patola Design Outfit

Blog banner

I Personally

Blog banner

Why You Need 2FA (Two-Factor Authentication) On Your Email And Other Online Accounts

Blog banner

Title: Modern Operating Systems: Powering the Digital Era

Blog banner

Cyber Forensic in the Banking sector

Blog banner

Fitness regime by Deepesh

Blog banner

LTE Technology

Blog banner

Virtual memory

Blog banner