wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Study on cyber and network forensic in computer security management

profile
16_Abhay Kamble
Mar 14, 2022
0 Likes
0 Discussions
108 Reads

We are living in a world of technology 
where computers are being used every day
from personal use, social interaction to 
business wise. Most storage medium of 
information relies on electronic devices like 
hard disks and flash, as well as cloud 
storage. Also the trending of smartphone 
usage nowadays also increases the risk of 
cybercrime as most transactions and 
communication online is done over 
smartphones. That poses vulnerabilities to 
attackers online to steal information such 
passwords, credit and bank credentials, 
etc.
The paper will then highlight basics 
associated with computer and network 
security. Also information beneficial to 
prosecutors as well as Law enforcement on 
the guidelines and procedures for making 
use of digital evidence as well as obtaining 
it. Also to ensure the collected evidence 
information is made admissible to be used in court. The paper will generalize on the 
world of forensics and how it all works.


Comments ()


Sign in

Read Next

TECHNOLOGY : BOON OR CURSE ?

Blog banner

Data Mining

Blog banner

The Future of Cybersecurity: Trends, Challenges, and Strategies

Blog banner

CYBER FORENCIS: PAST, PRESENT AND FUTURE.

Blog banner

Memory Management

Blog banner

Cache memory

Blog banner

Expressing and Measuring Risk (Risk Management)

Blog banner

Multiprocessor and scheduling

Blog banner

Starvation

Blog banner

Why Festivals Are the Best Classrooms for Young Minds?

Blog banner

Kernel in Operating System

Blog banner

Top 5 Benefits of Artificial Intelligence

Blog banner

Trello ( management software)

Blog banner

OPERATING SYSTEM

Blog banner

Modern operating system

Blog banner

I/O Buffering

Blog banner

1 Dentist in Maroubra, Sydney and her 10 obsessions

Blog banner

Online Games

Blog banner

Depression

Blog banner

How to use open SSL for web server - browser communication

Blog banner

Traditional UNIX Scheduling

Blog banner

Riddhi Miyani 53003220140

Blog banner

Number Guessing game --lisp

Blog banner

Deadlock in operating system

Blog banner

social media issue

Blog banner

Evolution of operating system

Blog banner

Sweet and Sour Mango Pickle (Gol Keri)

Blog banner

Rain bow

Blog banner

Buffering

Blog banner

MySQL

Blog banner

What are the different types of E-mail crime and process of email forensic?

Blog banner

Evolution of Operating System

Blog banner

VPN

Blog banner

Service Design Model

Blog banner

DEVELOPMENTS LEADING TO MODERN OPERATING SYSTEMS

Blog banner

Technical Challenges and Directions for Digital Forensics

Blog banner

Ola

Blog banner

Digital black market or dark net poses a national security threat?

Blog banner

ADD A SPICE TO YOUR LIFE.

Blog banner

Simple AI Symptom Diagnosis Using LISP – Rule-Based Expert System

Blog banner

Social Media Sentiment Analysis

Blog banner

objectives and function of operating system

Blog banner