.

Monday, May 13, 2019

Computer Forensics 2015 Research Paper Example | Topics and Well Written Essays - 1500 words

info processor Forensics 2015 - Research Paper ExampleThe user data preempt be extracted from personal storage devices same computer hard disk, flash drive, memory cards etc (Computer forensics a critical need in computer, n.d )Whenever a person online on internet he/she leaves behind the logs on performed activities. This provides the digital come afterability of the persons activities which he/she has performed on internet by using these logs of visited websites. Flash templates and videos buffered can also be gathered from maverick file of the computer which the person was using. This accessibility to trace the logs, cookies, files and templates can help in analyzing the crime act computers and may help in providing the strong evidence against the cyber-criminal or hacker. Many users think that after deleing data from hard drive it cannot be traced but there are many techniques and methods by which the deleted data can be recovered. The computer system does not usually thr ash the data completely even if it is withdraw from recycle bin. These files remain alive until it is replaced or overwritten by new data. These methods of tracing can facilitate in forensic investigation to trace down the criminal by investigating the computer system employ by the criminal. For instance, during the execution of search warrant of serial killer John Robinson at the residence, law enforcement agencies wear five computers along with badly decomposed two dead bodies (Computer forensics, n.d ). After investigating the computer used by the serial killer John Robinson, it was discovered that he used the internet to find them and then instrument the meeting, after sexual assault they were killed. These facts cannot be gathered with physical evidence techniques and evidence and without computer forensic technique (Computer forensics, n.d ). There are many computer forensic techniques which can be used to trace the criminal but they are usually categorized

No comments:

Post a Comment