Computer Forensics

Computer Forensics

Computer Forensics

Overview of Computer Forensics in relation to cyber crime: [1]Securing and processing digital evidence requires special knowledge and tools to ensure that evidence is properly maintained for future presentation in a court of law. These tools consist of hardware devices and software designed to prevent changes to digital evidence being examined. These tools allow for duplication of digital evidence in a format that can be safely examined and allow for examination of data at a level that ordinary users cannot see. Many of these special software tools were originally stand-alone programs or applications that performed a narrowly focused task. Improvements in this technology now combine computer forensic tools into a suite of software capable of performing a multitude of examination and recovery tasks.

Resources

Notes and References

1. By Joseph F. Hennekey

See Also

  • Types of Cybercrime
  • Cybercriminal

Further Reading

McQuade, S.C. (2006). Investigating and prosecuting cybercrime. In Understanding and managing cybercrime (pp. 331–403). Boston: Pearson Education, Inc.; Reith, M., et al. (2002, Fall). An examination of digital forensic models. International Journal of Digital Evidence, 1(3); Scientific Working Group on Digital Evidence. (2007, November 5). Available at https://68.156.151.124/index.html.


Posted

in

,

by

Comments

Leave a Reply

Your email address will not be published. Required fields are marked *