Thy Kingdom Come Thy Will Be Done

The Musc of the year, thy kingdome come thy will be done, check it out and let me know what you'll think. 

test driven development

Test Driven Development has Revolutionized the Software Development Life Cycle Part II

The programming arena is plagued with many issues, which developers can solve, when they follow a software development methodology, which suites the project.

In today’s article we are going...

test driven development

Test Driven Development has Revolutionized the Software Development Life Cycle

In the programming arena, developers have to work in the dark, which is very similar to walking in a dark house from room, to room to understand what each room can do, and use that room for a...

lean software development

The Seven Principles of Lean Software Development

The computer world, is taking over the world, due to the software development processes, which have been changing on a daily basis.

In today’s article, we are going to talk about, the lean...

project management

Project Management is Essential for Projects to be Completed

A project must be managed well, in order for the project, to not go through certain problems and be able to face uncertainties.

Without project management, everything we see today, wouldn’t...

Computer Forensics has Revolutionized the Justice Systems of The World

cyber security

As our current world becomes more and more intertwined with technology, criminal activities are happening in the cyber world, and there must be a science to stop these crimes.

In today’s article, we are going to talk about computer forensics, which is a science that involves using as evidence in civil, criminal or administrative cases, digital information, which is well analyzed.

Computer forensics is like the new kid on the block, because it is at its beginning stages of development.

This science has been developed, because people can use computers to perform criminal and illegal activities, such as hacking into systems, leaking trade secrets, steal personal information through phishing messages, and unleash the terror of new viruses.

Computers, cell phones, PDAs, and other handheld devices, can be thought of as digital brains, which are very durable, because they don’t forget anything.

Electronic closets are used, in the digital brain, to pack detailed copy of every email, text message, document, Internet upload or download, Google search, Facebook personal chat and posting, iPhone web Chatter conversation, photos, financial transactions, and address books.

Criminals are often caught and found guilty, of crimes, due to the amount of information that is left, on each of the electronic closets.

Computer forensics tools, can be used in order to pick through the digital brains, and find skeletons inside these electronic closets.

E-evidence is the name used, for the information extracted from a computer, which can incriminate a person.

Files in computers are traceable, even after deleting that file, because a computer never truly deletes files.

A variety of applications, have been developed, due to the progress made, in computer forensics.

Computers are examined, by law enforcements, when murder, kidnapping and fraud are investigated.

Emails may be examined by investigators, history of internet browsing is viewed and deleted files are located, to be used as evidence, on court.

Inappropriate use of company computers, is also investigated, by companies with the use of computer forensics.

Of course, there are legal implications, when using computer forensics, for overseeing network security.

The policy decisions and technical actions in the context of existing laws, must be considered as well, by any network security professionals.

Before monitoring information that is collected, due to computer intrusion, a company must have authorization to use computer forensics.

When using security monitoring tools, authorization must be secured, because there are legal ramifications, if not done properly.

A federal felony punishable by a fine and/or imprisonment, could be constituted, if violations of any one of the privacy rules are broken.

There are with no doubt, many benefits to computer forensics, however if privacy laws are violated, then a procedure has to be in place, in order to prevent it, from happening again.

Computer forensics however, is indeed useful, and can help an organization identify the correct evidence, that can be used in court, in order to apprehend and prosecute, security violators.

A need for computer forensics, was the reason why this field, was created, because many organizations, saw a good use for this field.

Thank you, for reading this article!!!