Computer Safety_1

Computer Safety_1

Computer Safety

Wednesday, December 5, 2012

Computer Forensic


Computer forensic is "the discipline that combines elements of law and computer science to collect and analyze data from computer systems, networks, wireless communications, and storage devices in a way that is admissible as evidence in a court of law". The goal of computer forensic is to identify, collect, preserve, and analyze data so that the evidence found can be used in a court of law. There are two types of data collected: (1) persistent data—dead; and (2) volatile data—alive. The first type is those stored in the hard drive after the computer is turned off. The second type is those stored temporarily in the cache, and RAM (Random Access Memory) that will be erased when the computer is turned off. There are five basic steps to computer forensics: (1) preparation by the investigators, to prepare tools proper for use in court, (2) collection, (3) examination, (4) analysis, and (5) reporting.

Computer forensic is very important because it may determine a court decision. There have been many regulations and laws passed recently that mandate liability to companies, especially those relate to communication networks, if they were to lose the data belonged to their customers. Furthermore, if computer forensic is successfully carried out, it can discover hackers that attempt to intrude the system.  This applies from big company networks to personal computers. On the other hand, computer forensic can also be applied to find evidence against any illegal activities by companies or its employees.













Computer Forensics Kit










No comments:

Post a Comment