wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Study on cyber and network forensic in computer security management

profile
16_Abhay Kamble
Mar 14, 2022
0 Likes
0 Discussions
108 Reads

We are living in a world of technology 
where computers are being used every day
from personal use, social interaction to 
business wise. Most storage medium of 
information relies on electronic devices like 
hard disks and flash, as well as cloud 
storage. Also the trending of smartphone 
usage nowadays also increases the risk of 
cybercrime as most transactions and 
communication online is done over 
smartphones. That poses vulnerabilities to 
attackers online to steal information such 
passwords, credit and bank credentials, 
etc.
The paper will then highlight basics 
associated with computer and network 
security. Also information beneficial to 
prosecutors as well as Law enforcement on 
the guidelines and procedures for making 
use of digital evidence as well as obtaining 
it. Also to ensure the collected evidence 
information is made admissible to be used in court. The paper will generalize on the 
world of forensics and how it all works.


Comments ()


Sign in

Read Next

Security in Operating Systems

Blog banner

Concurrency and Deadlocks

Blog banner

History of Money

Blog banner

A Deep Dive

Blog banner

LINUX

Blog banner

Multiple processor scheduling

Blog banner

What is Anxiety? How to manage Anxiety?

Blog banner

Memory Management

Blog banner

Operating System

Blog banner

Modern Teaching Methods: Why Inquiry-based & Experiential Learning Works Best

Blog banner

Self-love: Being the reason of your own smile

Blog banner

Understanding the 'Ambiverts'

Blog banner

Pooja Silver

Blog banner

When Is the Right Time to Enrol My Toddler Into Preschool? NEP

Blog banner

File Management In OS

Blog banner

MEMORY HIERARCHY

Blog banner

Types of Malware in Cyber Security

Blog banner

MODERN OPERATING SYSTEM

Blog banner

Juveniles, Internet and Computer Crime

Blog banner

What is time ? The term which has astonished Scientists

Blog banner

10 Interesting facts you should know!!!

Blog banner

ARTICAL ON MANAGEMENT SYSTEM

Blog banner

Biometric Authentication and Privacy: Balancing Ethical Concerns

Blog banner

Every body is beautiful

Blog banner

Mumbai famous street food

Blog banner

What is online marketing and why do you need to know about it ?

Blog banner

What is Amazon?

Blog banner

Cache memory

Blog banner

Virtual memory

Blog banner

Europe Through My Lens

Blog banner

Introduction to Data Science: Life Cycle & Applications

Blog banner

Instagram

Blog banner

Man In The Middle Attack

Blog banner

How can denial-of-service(Dos) attacks be prevented?

Blog banner

Texting is actually better than talking in person

Blog banner

TRELLO

Blog banner

Explain the concept of ( MIS) Management information systems

Blog banner

Virtual memory in windows

Blog banner

File Allocation Methods

Blog banner

Brilliant WhatsApp Features Upcoming in 2023

Blog banner

What is process

Blog banner

Interrupts in OS

Blog banner