wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Study on cyber and network forensic in computer security management

profile
16_Abhay Kamble
Mar 14, 2022
0 Likes
0 Discussions
109 Reads

We are living in a world of technology 
where computers are being used every day
from personal use, social interaction to 
business wise. Most storage medium of 
information relies on electronic devices like 
hard disks and flash, as well as cloud 
storage. Also the trending of smartphone 
usage nowadays also increases the risk of 
cybercrime as most transactions and 
communication online is done over 
smartphones. That poses vulnerabilities to 
attackers online to steal information such 
passwords, credit and bank credentials, 
etc.
The paper will then highlight basics 
associated with computer and network 
security. Also information beneficial to 
prosecutors as well as Law enforcement on 
the guidelines and procedures for making 
use of digital evidence as well as obtaining 
it. Also to ensure the collected evidence 
information is made admissible to be used in court. The paper will generalize on the 
world of forensics and how it all works.


Comments ()


Sign in

Read Next

Why Mumbai Professionals Are Switching Back to Home-Style Tiffin Meals

Blog banner

What is service level Agreement?

Blog banner

All you need to know about “Off-page SEO”

Blog banner

Classification Vs Clustring? What's the diffrence?

Blog banner

A Tourist’s Guide To Florida’s Rodeo Culture: What To Expect At The Arcadia Championship Rodeo

Blog banner

Stop Racism

Blog banner

OS Assignment 3 Deadlock

Blog banner

Concurrency management in operating systems

Blog banner

Unlocking Success: Mastering Google Ads Strategies

Blog banner

Virtual machine and virtualizing

Blog banner

The Importance of Financial Literacy for College Students

Blog banner

Deadlock

Blog banner

What is metaverse?

Blog banner

How Does SSO Works

Blog banner

Cache memory

Blog banner

Internet of Things and cyber security

Blog banner

Traditional UNIX Scheduling

Blog banner

Modern operating system

Blog banner

Introduction to Data Science: Life Cycle & Applications

Blog banner

Memory management

Blog banner

Fitness regime by Deepesh

Blog banner

Deadlock and Starvation

Blog banner

Direct Memory Access

Blog banner

Memory Management

Blog banner

Data Structures

Blog banner

The Everyday Parenting Dilemma: Safety Vs Independence

Blog banner

Education: Key to your Prosperity

Blog banner

MEMORY HIERARCHY

Blog banner

TOP 5 GAMING GADGETS (2024)

Blog banner

10 Unknown facts about India's Independence

Blog banner

GIS Topography

Blog banner

Artical on FreshBooks

Blog banner

HubSpot

Blog banner

Kafka - A Framework

Blog banner

Culture Of Ladakh

Blog banner

Daycare Centres Help Children Transition into Structured Learning

Blog banner

Deadlock

Blog banner

Explain the concept of ( MIS) Management information systems

Blog banner

Boxing

Blog banner

Decoding Modern Assessment: Why We Look Beyond the Grade Sheet

Blog banner

Memory Management

Blog banner

Trends that began during the pandemic

Blog banner