• Computer forensic science describes the scientific process to investigate criminal activity using a computer and the presentation of that at trial. It’s showing that computers have been used in the process of committing crimes.
• Computer forensic analyst may recover such things as child pornography, stolen password and banking information, information pertaining to any criminal activity.
• The process of computer forensics is to duplicate the hard drive, generate hash value, to maintain integrity, verify file signature, examine computer disk , complete analysis. Then make a forensic report.
• An accepted methodology is important because the original evidence needs to be protected with an acceptable protocol that doesn’t differ. This way when the evidence goes to trial it is easily understood and translated to the court.
• GUI used by Microsoft windows is a point and click user-friendly application. Easy to use there are two versions Encase, forensic tool kit, password cracking is an important component of this program they also have image viewing through gallery systems keyword search.
• Command line: These are mush cheaper programs but much more difficult to use. These programs are reminiscent of the old DOS style. One of these programs allows for a bit by bit brake down of a disk. It provides al of the same programs that the GUI programs offer but they are more difficult to use and work better for an already computer savvy individual.
Until tomorrow. Fortune favors the brave! Samantha Shu
No comments:
Post a Comment