wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Study on cyber and network forensic in computer security management

profile
16_Abhay Kamble
Mar 14, 2022
0 Likes
0 Discussions
108 Reads

We are living in a world of technology 
where computers are being used every day
from personal use, social interaction to 
business wise. Most storage medium of 
information relies on electronic devices like 
hard disks and flash, as well as cloud 
storage. Also the trending of smartphone 
usage nowadays also increases the risk of 
cybercrime as most transactions and 
communication online is done over 
smartphones. That poses vulnerabilities to 
attackers online to steal information such 
passwords, credit and bank credentials, 
etc.
The paper will then highlight basics 
associated with computer and network 
security. Also information beneficial to 
prosecutors as well as Law enforcement on 
the guidelines and procedures for making 
use of digital evidence as well as obtaining 
it. Also to ensure the collected evidence 
information is made admissible to be used in court. The paper will generalize on the 
world of forensics and how it all works.


Comments ()


Sign in

Read Next

WHAT IS TWITTER AND HOW DOES IT WORK

Blog banner

Threat from Inside: Educating the Employees Against Cyber Threats

Blog banner

Bharat Maps

Blog banner

Sagar Parikrama

Blog banner

Data Visualization

Blog banner

OS PROCESS DESCRIPTION AND CONTROL-SARVAGYA JALAN

Blog banner

Chicken Dum Biryani

Blog banner

Booting Process In Operating System

Blog banner

Caching windows

Blog banner

IT security management

Blog banner

Network Security Risks

Blog banner

ROLE OF THE COMPUTER FORENSICS TOOLS AND TECHNIQUES

Blog banner

Privacy-Enhancing Computation Techniques

Blog banner

Mumbai

Blog banner

PERSONALITY DEVELOPMENT

Blog banner

Building a Better You: Fitness Tips and Inspiration.

Blog banner

Game via listing method

Blog banner

THE INPACT OF SOCIAL MEDIA!

Blog banner

MPL and how its effects?

Blog banner

Texting is actually better than talking in person

Blog banner

RSA (Rivest-Shamir-Adelman) Algorithm

Blog banner

Denial-of-Service and Distributed Denial-of-Service Attack Techniques

Blog banner

Automating OSINT tasks for efficient Cyber Forensics Investigations

Blog banner

Method of Evaluating Information Security Level in an Organization

Blog banner

IOT Hacking Techniques

Blog banner

MY FIRST BLOG?

Blog banner

E-learning

Blog banner

Evolution of operating systems

Blog banner

Threats To Computer System

Blog banner

Memory hierarchy

Blog banner

Deadlocks

Blog banner

Importance of modern technology era

Blog banner

The New Dr. Frankenstein who will perform first full head transplant

Blog banner

Meal Maharaj — 3 CP, 5 CP, 8 CP. Same Love, Different Portions

Blog banner

Deadlock

Blog banner

Outlook.com

Blog banner

Race Condition in Operating Theatre

Blog banner

Data Lake

Blog banner

Cache Memory

Blog banner

ONLINE NEWSROOMS

Blog banner

Maharashtrian culture: Tradition, Art, Food

Blog banner

UniProcessor Scheduling

Blog banner