Thursday, May 9, 2019
Computer Forensics Essay Example | Topics and Well Written Essays - 2250 words
Computer Forensics - establish ExampleWe live in borderless world. Although people our bounded by geographic terrain, the World Wide vane has made it possible for people to connect with each other with a click of the mo riding habit. Truly, this is a marvellous world to live.With this added convenience, old problems have begun to take on new forms. Before, crimes involving money usually involved the use of physical harassment and coercion. Banks get robbed, and even some personnel were killed. Some rich or soft people found themselves abducted for ransom. But today, theft is more insidious and even subtle. One may not realize that he or she has been a victim already.When the Internet got into the hands of many people and that invigoration has become intertwined with it, more and more people have become susceptible to crimes committed via the Internet, usually termed as cybercrime. This paper shall survey the emerging technologies that are being used against cybercrime. In partic ular, we shall take a gestate at the developments happening in the field of computer forensics and how law-enforcement agencies are capitalizing on these. But for a start, permit us examine what cybercrimes are.Etymological systemally speaking, cybercrimes are crimes committed via the world-wide web. Although no rigorous definition of it has been formulated, we can accept the common sense definition as useful. Examples of cybercrimes are gaining unauthorized access to computer files, disrupting the operation of remote computers with viruses, worms, logic bombs, Trojan horses, and denial of service attacks distributing and creating child pornography, stealing anothers identity selling contraband, and stalking victims. (Nesson, 2001)Almost everyone knows approximately the damages inflicted by Melissa and ILOVEYOU viruses. Once in a while, a news report features the give up of a hacker or a perpetrator of identity theft. These are not just junior-grade crimes they struck damages to our economy. As a matter of fact, the FBI reports an annual loss of about $ 67 jillion due to such acts. (Cybercrime, 2007).Computer ForensicsWith these in mind, there must be found a way of life to prevent these crimes. If not, perhaps prosecution of the criminal will suffice. We should look to our law-enforcing agencies with their use of Computer Forensics. Computer Forensics is akin to the regular forensics procedures done by law enforcers, such as those seen in CSI. Computer forensics is a minute and scientific study, research and implementation of computer science subjects for the purpose of gathering digital evidence in cases of cyber crimes or for other scientific research purposes. In computer networks, experts use packet sniffing, IP greet tracing and email hook tracing. (Vyavhare, 2007)Packet sniffing is the retrieval of crucial data packets from networks. These may contain usernames or passwords used by cybercriminals.IP addresses are unique, but sometimes crimin als use proxy. The goal of IP address tracing is to trace the real IP address of the culprit.Email tracing is used when it is possible that the cybercriminal is hitherto in the location where a questionable email has been sent. If not, by tracing the email, this may provide rich clues.In computer systems, the computer forensics expert, analyzes the file structure, checks the storage media, uses steganography (the art of concealing information in images, sounds, or any unconventional file format), and
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment