Computer Forensics
Computer Forensics
Overview of Computer Forensics in relation to cyber crime: [1]Securing and processing digital evidence requires special knowledge and tools to ensure that evidence is properly maintained for future presentation in a court of law. These tools consist of hardware devices and software designed to prevent changes to digital evidence being examined. These tools allow for duplication of digital evidence in a format that can be safely examined and allow for examination of data at a level that ordinary users cannot see. Many of these special software tools were originally stand-alone programs or applications that performed a narrowly focused task. Improvements in this technology now combine computer forensic tools into a suite of software capable of performing a multitude of examination and recovery tasks.
Resources
Notes and References
1. By Joseph F. Hennekey
See Also
- Types of Cybercrime
- Cybercriminal
Further Reading
McQuade, S.C. (2006). Investigating and prosecuting cybercrime. In Understanding and managing cybercrime (pp. 331–403). Boston: Pearson Education, Inc.; Reith, M., et al. (2002, Fall). An examination of digital forensic models. International Journal of Digital Evidence, 1(3); Scientific Working Group on Digital Evidence. (2007, November 5). Available at https://68.156.151.124/index.html.
Leave a Reply