Computer forensic - Essay Example

Only on StudentShare

Extract of sample
Computer forensic

The history of computer forensic starts with the first time a system administration had to figure out how and what a hacker had done to gain unauthorized access to explore the system. In the beginning, the classic hacker breaking into computer system was more interested in how things work than actually being malicious.As computer evolved out of academic to business and government, there was more data and resource at risk. Hackers incursions became an issue handled through legal channels. While deciding which internal or external parties should handle each aspect of forensics, organization should consider factors such as personnel and equipment costs for collecting data, the time needed internal or external teams to respond to incidents, and data sensitivity and privacy issues. (United States Department of Justice, 2001) IT professionals throughout the organization, especially incident handlers and the first responder to incidents, should understand their roles and responsibilities for forensics. They should be given training and education on forensic, related to the company’s procedures, and they should be prepared to corporate with and assist others when the problems occur for which they were been trained (Nelson, Amelia, & Steuart, 2004). Incident handlers performing forensic tasks should have a broad knowledge of forensic principles, guidelines, procedures, tools, and techniques, as well as anti-forensic tools and techniques that could conceal or destroy data. ...
Download paper

Summary

The history of computer forensic starts with the first time a system administration had to figure out how and what a hacker had done to gain unauthorized access to explore the system.In the beginning,the classic hacker breaking into computer system was more interested in how things work than actually being malicious…
Author : brandyn16

Related Essays

human computer interaction (user interface )
Reference: Chapman, Callum. "Common Elements Used in Interface Button Design." Web Designer Dept. (2011): 4. Web. 20 Dec. 2011. <, http:/www.webdesignerdepot.com/2011/04/common-elements-used-in-interface-button-design/>. TYPOGRAPHY The fonts and typefaces are important elements of the user interface. It should be in proportionate with the design or else it will just look like a clutter. I learned that it should draw attention to the content taking in consideration its size, lines and shade. The overall appearance of the font is in conjunction with its readability which is highly essential for...
7 pages (1757 words) Coursework
Case study Case Study
An order for specific performance of the contract was appropriate because of two reasons: 1) the Wirraway was not at the time in flying condition, and 2) the plane was in a hangar owned by a third party....
6 pages (1506 words) Case Study
Forensic Evidence
According to Mr. and Mrs. Anderson, Caroline is a college student at the State University of New York and has a part-time clerical job at the university. They do not have the resources to locate their missing daughter, personally; hence, they are seeking the help of NYPD....
6 pages (1506 words) Case Study
Computer technology advancement in Forensic science
The system was great for its time. System worked well. The image was not of best quality it worked, better then the old Identity kit. Nothing compares to a good forensic composite artist who can draw the image by hand. However, for those of us who aren't so talented with that medium, the computer and software became our medium and the results were excellent. Computer industry changed. The VISATEX program was in the DOS environment, everything was changing to a graphical environment, Windows. The costs of computers were dropping fast, the programs were cheaper and a lot of those in the industry...
2 pages (502 words) Essay
Computer Forensics
We live in borderless world. Although people our bounded by geographic terrain, the World Wide Web has made it possible for people to connect with each other with a click of the mouse. Truly, this is a wonderful world to live....
9 pages (2259 words) Essay
Falcon Computer Company
This essay discusses that discrepancy was largely witnessed as the promotions of the values were not appropriately communicated and enforced in practice by the management. ...
4 pages (1004 words) Case Study
See Attached
The ping is an important utility of the Internet Control Message Protocol (ICMP) that helps in verifying that a given host is operational (Chen & Davis, 2006). Ping sweeps are used to detect the IP addresses that are being used by live hosts. Ping messages are made up of a pair of ICMP messages referred to as Echo Request and Echo Reply (Chen & Davis, 2006). Unfortunately, ping is usually taken advantage of by attackers to scan a block of IP addresses for a set of active hosts. There are many tools that can perform a ping sweep, and this further makes it easy for attackers to exploit. The...
2 pages (502 words) Case Study
Got a tricky question? Receive an answer from students like you! Try us!