wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

CYBER FORENCIS: PAST, PRESENT AND FUTURE.

profile
44_Rohit Sharma
Mar 14, 2022
0 Likes
0 Discussions
161 Reads

Cyber Forensics is defined as the process of preservation, identification, extraction, and documentation of computer evidence which can be used by the court of law. It is a science of finding evidence from digital media like a computer, mobile phone, server, or network. It provides the forensic team with the best techniques and tools to solve complicated digital-related cases. Due to increases in attacks against systems, states, and consumer products, companies like organizations and governments have taken security more seriously.

 

Prior to the 1970s crimes involving computers were dealt with using existing laws. The first computer crimes were recognized in the 1978 Florida Computer Crimes Act, which included legislation against the unauthorized modification or deletion of data on a computer system. One of the first practical examples of digital forensics was Cliff Stoll’s pursuit of hacker Markus Hess in 1986. Since the late 1990s mobile devices have become more widely available, advancing beyond simple communication devices, and have been found to be rich forms of information, even for crime not traditionally associated with digital forensics.

 

The tools of cyber forensic investigation are X- Ways WinHex, First on Scene, Rifiuti, Pasco, Galleta/Cookie, Forensic Acquisition Utilities, NMap, Ethereal, BinText, Encrypted disk detector, MemGator. Rifiuti is a tool which helps in finding the last details of a system's recycle bin. It helps in collecting all the deleted and undeleted files. Pasco is a Latin word meaning browse.

 

We are in the digital world. We need to know who and how we are being attacked digitally. Therefore, we need to know our security, safety, and privacy features while using safe browsing. When we click on any link, be sure it is related to us and verify twice. Never respond to any email if find unusual. Business organizations need to follow IT principles. They must educate their employees on what to do if any suspicious activity is recognized. This is not for only the recognition of suspects, but they need to know what actions put them in a dangerous zone. A forensic department is required in case of failure of cybersecurity. Digital forensics help to get evidence and can be produced before a court. This evidence will punish the culprit.


Comments ()


Sign in

Read Next

Best password managers: Reviews of the top products

Blog banner

Fault Tolerance

Blog banner

Electronic Funds Transfer

Blog banner

Danger assessment in GIS

Blog banner

Service Operations Principles

Blog banner

Mumbai Metro 3

Blog banner

Koinex is shutting down and here is how you can withdraw...

Blog banner

Importance of Education

Blog banner

objectives and functions of operating system

Blog banner

How To Implement Search Engine Marketing (Sem) Strategy Effectively

Blog banner

“Shot on iPhone” : A campaign by Apple that turned into a prodigy

Blog banner

RACI model in IT services

Blog banner

Place to visit in pune

Blog banner

Rain

Blog banner

Study of Backdoor and Trojan tools

Blog banner

Partnership in Learning: How Parent Involvement Shapes a Child’s Early Education

Blog banner

Getting into Anime

Blog banner

FILE SHARING

Blog banner

RSA (Rivest-Shamir-Adelman) Algorithm

Blog banner

Beautiful and stunning natural phenomena worth to see

Blog banner

Synchronization

Blog banner

Banaras

Blog banner

All you need to know about Cassandra

Blog banner

Intrusion Detection System

Blog banner

KEAP MANAGEMENT SYSTEM

Blog banner

Security Issues and Countermeasures

Blog banner

Kernel Memory Allocation In Linux.

Blog banner

The Sunny Side of Instagram

Blog banner

Virtual Memory

Blog banner

Top Career Paths After a B.Com Degree in Mumbai: What’s Next for You?

Blog banner

Security issues

Blog banner

Threats To Computer System

Blog banner

What is Segmentation?

Blog banner

My favourite food

Blog banner

Artical on FreshBooks

Blog banner

Solitary Play Activities for Preschoolers: Types and Benefits

Blog banner

undefined

Blog banner

Apache Kafka

Blog banner

Odoo

Blog banner

Cyber Security Standards

Blog banner

History of Money

Blog banner

Sensory Play for Toddlers: Boosting Curiosity Through Touch, Sound, and Colour

Blog banner