wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Study on cyber and network forensic in computer security management

profile
16_Abhay Kamble
Mar 14, 2022
0 Likes
0 Discussions
108 Reads

We are living in a world of technology 
where computers are being used every day
from personal use, social interaction to 
business wise. Most storage medium of 
information relies on electronic devices like 
hard disks and flash, as well as cloud 
storage. Also the trending of smartphone 
usage nowadays also increases the risk of 
cybercrime as most transactions and 
communication online is done over 
smartphones. That poses vulnerabilities to 
attackers online to steal information such 
passwords, credit and bank credentials, 
etc.
The paper will then highlight basics 
associated with computer and network 
security. Also information beneficial to 
prosecutors as well as Law enforcement on 
the guidelines and procedures for making 
use of digital evidence as well as obtaining 
it. Also to ensure the collected evidence 
information is made admissible to be used in court. The paper will generalize on the 
world of forensics and how it all works.


Comments ()


Sign in

Read Next

Linker

Blog banner

Bots and Cyber Security

Blog banner

Gamer life

Blog banner

Challenges and risks in service operations

Blog banner

Big Data Architecture

Blog banner

GIS Mapping

Blog banner

Platonic Solids

Blog banner

Mail merge

Blog banner

Smartsheet

Blog banner

HOW CAN SOCIAL MEDIA MAKE YOU HAPPIER?

Blog banner

Unlocking the Secrets: Basic Operations of Computer Forensic Laboratories

Blog banner

Predictive Analysis - Ek Overview

Blog banner

STARVATION

Blog banner

Raid

Blog banner

Importance of business process documentation

Blog banner

Virtual Memory - Explaination, Working, Steps

Blog banner

Deadlock

Blog banner

Digital Balance: Keeping Children Mindful in the Screen Age

Blog banner

Topic: Sessions in Operating system

Blog banner

Password Generator - Lisp

Blog banner

Network Forensics

Blog banner

Fault tolerance

Blog banner

Mumbai

Blog banner

How return on investment is defined in IT services

Blog banner

The Right way of cooking

Blog banner

Uniprocessor Scheduling

Blog banner

Proton mail

Blog banner

Why Consistency in Eating Habits Matters and How Meal Maharaj Makes It Easy

Blog banner

IT service level agreement

Blog banner

objectives and functions of operating system

Blog banner

Operating system

Blog banner

Service Design Model

Blog banner

Theads

Blog banner

Different Types of Data

Blog banner

I/O Buffering

Blog banner

LEMON PICKLE (NIMBU KA ACHAR)

Blog banner

Facebook Shut Down an AI Program!!! Facebook AI bots became Terminators???

Blog banner

Social Engineering

Blog banner

How I use google in my daily life

Blog banner

Article on Team Work

Blog banner

Dove’s Real Beauty Campaign- Case Study

Blog banner

Memory Management

Blog banner