Monday, February 4, 2019

Computer Forensics :: Technology, Science, Computer Applications

Computer forensics is the specialized exert of investigating calculator media for the purpose of discovering and analyzing available, effaced, or "hidden" information that whitethorn serve as useful evidence in a level-headed matter. (Steen, Hassell 2004)Computer forensics has become a very important factor of cruel investigations. Since computing devices choose become mainstream the need for a science that go out shroud with the technology has become an issue for the judicial and legal system. Some of the areas computer forensics may be utilized are     Copyright infringement     industrial espionage     Money laundering     Piracy     Sexual harassment     Theft of reason property     Unauthorized access to confidential information     Blackmail      subversive activity   & nbsp DecryptionWhen the investigator finds a computer that may hold evidence, they prime(prenominal) create an exact image of the drive. This prevents any inadvertent damage to the system. The toller image is important because more than 160 alterations are made to files when a computer is turned on which can change or delete important evidence.Several events take place on a computer when a file is changed. A file status maker is spate meaning their distance is now available. But even though you have deleted the file, it stays in the same feeling and is called free or unallocated space and is available until the whole space is create verbally over by another(prenominal) file. The computer forensic specialist may retrieve the data until it is written over by the new file. Another place for information to cover up is called slack space, meaning, sometimes information being stored in an area will not use all of the available space in the designated spot and the unused portion becomes the slack space.

No comments:

Post a Comment