Twitter icon
Facebook icon
RSS icon
computer forensics

Computer Forensics Fields - A Brief Overview

The computer forensics field, has helped the justice department lock up a lot of offenders, and as technology advances criminals, find it very hard to hide or delete incriminating data from a...

Data Compression

Data Compression is a Great Way to Reduce Data Size

The process which reduces data sizes, by removing excessive information is known as data compression. The size of a file is reduced, in order to save space, save time and reduce redundancy, during...


Converting A Binary Number to Decimal and to Hexadecimal

In order to be able to convert a decimal number to binary, one must have a basic understanding of the decimal, binary and hexadecimal numbering systems. Decimal numbers are used often in...

Agile Software Development

The Agile Software Development Methodology - Overview

On the article written by Hobbs and Petit, they explain that the agile software development methodology, has been gaining popularity, since the 2000s, and have taken software development by storm...


Introduction to Waterfall Methodology

The development phase of an application, have always followed a waterfall method, but later the agile method was also adopted. As one of the oldest methods used, to develop a software, the...

Computer Forensics has Revolutionized the Justice Systems of The World

cyber security

As our current world becomes more and more intertwined with technology, criminal activities are happening in the cyber world, and there must be a science to stop these crimes.

In today’s article, we are going to talk about computer forensics, which is a science that involves using as evidence in civil, criminal or administrative cases, digital information, which is well analyzed.

Computer forensics is like the new kid on the block, because it is at its beginning stages of development.

This science has been developed, because people can use computers to perform criminal and illegal activities, such as hacking into systems, leaking trade secrets, steal personal information through phishing messages, and unleash the terror of new viruses.

Computers, cell phones, PDAs, and other handheld devices, can be thought of as digital brains, which are very durable, because they don’t forget anything.

Electronic closets are used, in the digital brain, to pack detailed copy of every email, text message, document, Internet upload or download, Google search, Facebook personal chat and posting, iPhone web Chatter conversation, photos, financial transactions, and address books.

Criminals are often caught and found guilty, of crimes, due to the amount of information that is left, on each of the electronic closets.

Computer forensics tools, can be used in order to pick through the digital brains, and find skeletons inside these electronic closets.

E-evidence is the name used, for the information extracted from a computer, which can incriminate a person.

Files in computers are traceable, even after deleting that file, because a computer never truly deletes files.

A variety of applications, have been developed, due to the progress made, in computer forensics.

Computers are examined, by law enforcements, when murder, kidnapping and fraud are investigated.

Emails may be examined by investigators, history of internet browsing is viewed and deleted files are located, to be used as evidence, on court.

Inappropriate use of company computers, is also investigated, by companies with the use of computer forensics.

Of course, there are legal implications, when using computer forensics, for overseeing network security.

The policy decisions and technical actions in the context of existing laws, must be considered as well, by any network security professionals.

Before monitoring information that is collected, due to computer intrusion, a company must have authorization to use computer forensics.

When using security monitoring tools, authorization must be secured, because there are legal ramifications, if not done properly.

A federal felony punishable by a fine and/or imprisonment, could be constituted, if violations of any one of the privacy rules are broken.

There are with no doubt, many benefits to computer forensics, however if privacy laws are violated, then a procedure has to be in place, in order to prevent it, from happening again.

Computer forensics however, is indeed useful, and can help an organization identify the correct evidence, that can be used in court, in order to apprehend and prosecute, security violators.

A need for computer forensics, was the reason why this field, was created, because many organizations, saw a good use for this field.

Thank you, for reading this article!!!