wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Study on cyber and network forensic in computer security management

profile
16_Abhay Kamble
Mar 14, 2022
0 Likes
0 Discussions
108 Reads

We are living in a world of technology 
where computers are being used every day
from personal use, social interaction to 
business wise. Most storage medium of 
information relies on electronic devices like 
hard disks and flash, as well as cloud 
storage. Also the trending of smartphone 
usage nowadays also increases the risk of 
cybercrime as most transactions and 
communication online is done over 
smartphones. That poses vulnerabilities to 
attackers online to steal information such 
passwords, credit and bank credentials, 
etc.
The paper will then highlight basics 
associated with computer and network 
security. Also information beneficial to 
prosecutors as well as Law enforcement on 
the guidelines and procedures for making 
use of digital evidence as well as obtaining 
it. Also to ensure the collected evidence 
information is made admissible to be used in court. The paper will generalize on the 
world of forensics and how it all works.


Comments ()


Sign in

Read Next

Monday. com App

Blog banner

Festive Ethnic Wear Guide: Patola-Inspired Looks for Every Celebration

Blog banner

Fitness

Blog banner

Data Mining

Blog banner

Explain Multiprocessors

Blog banner

Health is Wealth

Blog banner

Data Science in Predictive Analytics: Transforming Business Decision-Making

Blog banner

Introduction to Data Science: Life Cycle & Applications

Blog banner

Decoding the Weave — How to Identify Original Patola Art on a Fabric

Blog banner

What is Segmentation?

Blog banner

Self managing devices

Blog banner

What is semaphore in operating system?

Blog banner

All you need to know about “On-page SEO”

Blog banner

LEMON PICKLE SWEET AND MILD HOT

Blog banner

I/O Buffering

Blog banner

"Mahakali cave"

Blog banner

The Rise of Evil Twin Attacks: A New Kind Of Spoofing Cyberattack

Blog banner

The Power of Cyber Forensic in Solving Crimes

Blog banner

Memory Management

Blog banner

Threads

Blog banner

CONCURRENCY

Blog banner

Memory Hierarchy

Blog banner

Man VS Nature

Blog banner

Be you

Blog banner

Deadlock in operating system

Blog banner

A MODERN OPERATING SYSTEM

Blog banner

Evolution of operating system

Blog banner

Instagram Features in 2023 That Will Leave You Stunned!

Blog banner

Google

Blog banner

Evolution of Operating Sytems

Blog banner

Operating Systems Overview

Blog banner

Cyber Forensics

Blog banner

The Khan mehtab transforming the modular switches

Blog banner

Os(Computer security threats)

Blog banner

TECHNOLOGY : BOON OR CURSE ?

Blog banner

Business Engineering

Blog banner

Types of Viruses

Blog banner

evolution of operating system - Disha Parekh

Blog banner

Wiretapping

Blog banner

Continual service improvement vs maintenance phase in IT

Blog banner

Access management

Blog banner

Modern Operating system

Blog banner