StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Forensics with UNIX. Prepaid Cell Phones - Essay Example

Cite this document
Summary
UNIX is a multiuser computer operating system which was developed in 1969 by several employees from AT&T (Perrin 2010). Some of these employees include Dennis Ritchie, Ken Thompson, Michael Lesk and Joe Ossanna among others…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.9% of users find it useful
Forensics with UNIX. Prepaid Cell Phones
Read Text Preview

Extract of sample "Forensics with UNIX. Prepaid Cell Phones"

Download file to see previous pages

One of the most common differences between the UNIX system and Microsoft Windows is the security characteristics in the system design. In most cases, organizations can be drawn into computer investigations even without their will. However, most digital investigations that involve the computer are not successful because of the mistakes that are made in an early stage. One of the most common predicaments is the destruction, compromising and ignoring of digital evidence. This can create a serious crisis within the victim organization (Perrin 2010).

Therefore, this crisis is supposed to be managed appropriately in order to ensure a successful digital investigation. The executive individuals in a corporation are supposed to have the capability of devising a corporate plan in the organization. This corporate plan should cover various risks including management structures, resourcing, core procedures, risk analysis and management aims. According to this information, UNIX is a user-friendly system in digital investigation as compared to Microsoft Windows (Sommer 2012).

The main difference in the design and the security level of Microsoft Windows and UNIX illustrates one of the crucial and distinct. As stated above, this difference is based on the philosophy of the security level in the design of the operating systems. . Lastly, the evidence must also satisfy the conditions that are set up by the legal tests of acceptability performed on the systems. UNIX has become one of the well known system targets that have attracted digital investigation. References Perrin, C 2010, UNIX vs.

Microsoft Windows: How system designs reflect security philosophy, viewed 4 Oct 2012, http://www.techrepublic.com/blog/security/unix-vs-microsoft-windows-how-system-designs-reflect-security-philosophy/4627 Sommer, P 2012, Digital evidence, digital investigations and E-disclosure: A guide to forensic readiness for organizations, security advisers and lawyers, viewed 4 Oct 2012, http://www.iaac.org.uk/_media/DigitalInvestigations2012.pdf Week 5 DQ2: prepaid cell phones Recent research proves that the cellular phones have become exceedingly valuable for the human beings.

This device can be used by all age groups to assist them with their life styles. The mobile phones have also topped the chart in social interaction. A prepaid cell phone is defined as a mobile phone which uses credit that has already been purchased in advance for the use of the mobile services (Virgin Mobile 2012). In this case, the purchased credit caters for all the mobile phone services that are accessed by the handler of the phone. The users usually top up their credit through several techniques depending of the payment mechanisms.

In the contemporary world, the prepaid cell phones are slowly evolving to a social event. This is because the device can be used for several purposes (Barit 2012). It is quite clear that the prepaid phones have a lower cost since; it is easier to control spending. However, the prepaid customers sometimes pay more for the mobile services depending on what they do with their phones.

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Forensics with UNIX. Prepaid Cell Phones Essay Example | Topics and Well Written Essays - 750 words”, n.d.)
Forensics with UNIX. Prepaid Cell Phones Essay Example | Topics and Well Written Essays - 750 words. Retrieved from https://studentshare.org/information-technology/1458083-week
(Forensics With UNIX. Prepaid Cell Phones Essay Example | Topics and Well Written Essays - 750 Words)
Forensics With UNIX. Prepaid Cell Phones Essay Example | Topics and Well Written Essays - 750 Words. https://studentshare.org/information-technology/1458083-week.
“Forensics With UNIX. Prepaid Cell Phones Essay Example | Topics and Well Written Essays - 750 Words”, n.d. https://studentshare.org/information-technology/1458083-week.
  • Cited: 0 times

CHECK THESE SAMPLES OF Forensics with UNIX. Prepaid Cell Phones

Unraveling the mystery of DNA

he long, spiralling molecule that orchestrates the cell's daily operations and provides the genetic blueprint for the physical characteristics of all living organisms.... How is the DNA structured Deoxyribonucleic acid or DNA is a part of our body which contains our genetic origins and functions which will determine how different or how similar we will look like our ancestors based on the genetic information stored in this cell.... A closer look at the DNA cell it is a long, but narrow string-like object....
8 Pages (2000 words) Essay

Forensic Accounting: Wolf Transport

Administrator and Liquidator are two different professionals dealing with insolvent companies.... However there are differences… An administrator is a person appointed by the court stating the company is under administration.... An administrator is either a registered liquidator or an official liquidator whereas an official liquidator only The purpose of administrator is to advise the creditors on viable solutions like ending the administration and returning the companies control to board of directors, converting the administration into a creditors voluntary liquidation or have the company enter into Deed of Company Arrangement (“DOCA”) under Sec....
9 Pages (2250 words) Essay

Computer Forensics Challenges

Documents maintained on a computer are covered by different rules, depending on the nature of the documents.... Many court cases in state and… The Fourth Amendment of the US Constitution ( and each state's constitution) protects everyone's right to be secure in their person, residence and property from search and seizure....
26 Pages (6500 words) Essay

Forensic investigator

The culprit was first reported by one of his classmates, Walter Thom, declaring that he had heard the culprit conversing about the deal over the cell phone, offering the bureau an opportunity to generate his phone records for the proceedings of this case.... As I reached the unit, I was presented with the criminal record file of James Murray (culprit), aged 19, an information technology student at Hartford High School....
16 Pages (4000 words) Essay

Fast-Evolving Nature of Technology

hellip; this light, this police department needs to create a computer forensics unit that will utterly address and overcome the inspective hurdles of a digital world and establish scientific and legal standards for digital forensic.... The unit will be fully equipped with a cyber-forensics laboratory which will specialize in digital evidence recovery, and which will also the facilitation of computer investigative training and development of forensic skills....
9 Pages (2250 words) Term Paper

The Conflict between Forensic Analysis and Business Process

Digital pieces of evidence can include for example computers, hard driver, USB memory device (Removable media) and cell phone, camera or internet history include web page cookies temporary internet files internet history can note the behavior pattern for the user and monitor any malicious attempt, text files, Documents, spreadsheets, servers, graphics file could be download image from the internet or scanned documentsPenetration Companys computer network and launching attacks into the system that case network downtime or releasing viruses or malicious code....
12 Pages (3000 words) Assignment

Security Risks on the Web

The paper "Security Risks on the Web" presents that with rapid global development came the electronic revolution.... Like other technologies, the Internet is now a necessity and without it, businesses would cease their operations.... There is an increase in the number of security risks on the Internet....
8 Pages (2000 words) Term Paper

Principles of Computer Security

The paper "Principles of Computer Security" traces concepts and terms related to cryptography, intrusion detection systems, standards and protocols, public and private keys, and hardening of the network.... Hence, suitable methods to overcome hackers' challenges become a part of computer security....
6 Pages (1500 words) Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us