Computer Forensics
#3
Computer forensics is a forensic science pertaining to legal evidence found in computers and digital storage mediums. Computer forensics is also known as digital forensics.computer forensics is to explain the current state of a digital artifact. The term digital artifact can include a computer system, a storage medium (such as a hard disk or CD-ROM),electronic document (e.g. an email message or JPEG image) or even a sequence of packets moving over a computer network. The explanation can be as straightforward as "what information is here?" and as detailed as "what is the sequence of events responsible for the present situation?" computer forensics also has sub branches within it such as firewall forensics, network forensics, database forensics and mobile device forensics.many reasons to employ the techniques of computer forensics:
In legal cases, computer forensic techniques are frequently used to analyze computer systems belonging to defendants (in criminal cases) or litigants (in civil cases).
To recover data in the event of a hardware or software failure.
To analyze a computer system after a break-in, for example, to determine how the attacker gained access and what the attacker did.
To gather evidence against an employee that an organization wishes to terminate.
To gain information about how computer systems work for the purpose of debugging, performance optimization, or reverse-engineering.Special measures should be taken when conducting a forensic investigation if it is desired for the results to be used in a court of law. One of the most important measures is to assure that the evidence has been accurately collected and that there is a clear chain of custody from the scene of the crime to the investigator-and ultimately to the court. In order to comply with the need to maintain the integrity of digital evidence, British examiners comply with the Association of Chief Police Officers (A.C.P.O.) .
These are made up of four principles as follows:-

Principle 1: No action taken by law enforcement agencies or their agents should change data held on a computer or storage media which may subsequently be relied upon in court.

Principle 2: In exceptional circumstances, where a person finds it necessary to access original data held on a computer or on storage media, that person must be competent to do so and be able to give evidence explaining the relevance and the implications of their actions.

Principle 3: An audit trail or other record of all processes applied to computer based electronic evidence should be created and preserved. An independent third party should be able to examine those processes and achieve the same result.

Principle 4: The person in charge of the investigation (the case officer) has overall responsibility for ensuring that the law and these principles are adhered to.


for more about computerforensic read http://en.wikipediawiki/Computer_forensics
http://computer-forensicold_site/presentations/ASIS_Presentation.pdf
http://us-cert.gov/reading_room/forensics.pdf
http://certarchive/pdf/FRGCF_v1.3.pdf
http://dns.co.uk/NR/rdonlyres/5ED1542B-6...ensics.pdf
http://e-evidence.info/thiefs_page.html
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: forensics college, a report on computer forensics, forensics, computer forensics software, computer aided brain fingerprinting forensics, steganography and visual cryptography in computer forensics, forgeries of jealousy rudys,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Messages In This Thread
Computer Forensics - by Computer Science Clay - 01-03-2009, 10:03 AM
RE: Computer Forensics - by syfizz - 15-09-2009, 03:15 PM
RE: Computer Forensics - by computer science crazy - 15-09-2009, 09:41 PM
RE: Computer Forensics - by pruthvikumar.123 - 18-03-2010, 06:52 PM
RE: Computer Forensics - by seminar-avatar - 22-03-2010, 08:43 PM

Possibly Related Threads...
Thread Author Replies Views Last Post
  computer networks full report seminar topics 8 45,891 06-10-2018, 12:35 PM
Last Post: jntuworldforum
  Optical Computer Full Seminar Report Download computer science crazy 46 69,776 29-04-2016, 09:16 AM
Last Post: dhanabhagya
  Computer Sci Seminar lists7 computer science crazy 4 12,298 17-07-2015, 10:29 AM
Last Post: dhanyasoubhagya
  Computer Architecture Requirements? shakir_ali 1 28,473 07-04-2015, 12:04 PM
Last Post: Kishore1
  Computer Architecture ACS Project? shakir_ali 0 7,575 30-10-2014, 12:01 AM
Last Post: shakir_ali
  eye gaze human computer interface shabeer 22 20,711 26-02-2014, 03:19 AM
Last Post: Guest
  BRAIN COMPUTER INTERFACE A SEMINAR REPORT Computer Science Clay 53 73,155 28-02-2013, 02:09 PM
Last Post: seminar details
  computer virus and anti virus full report computer science technology 12 20,854 28-01-2013, 03:28 PM
Last Post: seminar details
  Computer Science Seminar Topics A Big List computer science crazy 10 6,591 21-12-2012, 10:44 AM
Last Post: seminar details
  Computer Sci Seminar lists2 computer science crazy 3 3,401 10-11-2012, 11:09 AM
Last Post: seminar details

Forum Jump: