.

Wednesday, January 23, 2019

Methods in Computer Security Essay

One of the negative impacts of technological advancements is the advancement of flagitious methods. As one of the widespread progression in the whole beingness today, calculating machineization has been made an instrument for criminal offenses, and this has alarmed many calculator experts since the millennium bug had emerged, and was fortunately solved. Knowing the things that must be find in information processing system software and hardware investigation is authorised to tucket as a computer forensics expert.Current investigations usually dwell on individual category, but still it elicit be expanded to a more general sense in analyzing the patterns and motives of maybe not estimable individuals, but groups or organizations (Anderson, 1996). First, in either hardware of software, all cautionary procedures must be known by the investigator. Security for the reliability of the arising of information is of an utmost importance in fishing evidences towards solving a crime. T he computer itself is the first place that must be secured.A mien to secure them is to label them to avoid possible damages and interchange of the computer parts. Keeping the original state of the machine whether it is turned on/off, or maintaining connections at the back of the CPU or a laptop, is also a requirement for in the case of transportation, there might be a need to disassemble the parts, and knowing the original positions of the connections is relevant to restore the computer for investigation after transportation (Barba, __, p. 19). Second is the acquisition of electronic information.This can be obtained from the hard disk or other disk drives prone to the computer and to e-mails, where possible records of computer manipulation that the offender had do to the systems out front and after completion of the act are present. Looking at the deleted and unfathomed files is also a very crucial step, which might lead to the realisation of the possible objectives of the cri minal in deleting those data fragments, or what data he needed so as to complete his purpose (Barba, __, p.24). Upon identification of the important data files that are removed from the system, and if there exists any system legal proceeding that can be done through those files, like for example strand transactions, it would be the initiative of investigator to warn the potential persons that can be damaged when the transactions have been completed. The third thing that is important to rent is the recovery of the lost information that the client needs.It may also be possible to identify log-in passwords and usernames to monitor the users of the computer which can be associated with time of deletion of information, thus identifying the criminal. They can also look at the possible system protection measures to secure information and to avoid main course again to the system. The log and registry of the computer may trace this requirement information and identify changes on the comp uter codes (Sunblocksystems. com, 2007). Fingerprints may also be looked at in the case of a criminal act done at the place of the client itself.Identification of the criminal would be lots more specific at this case. References Anderson, K. E. (1996). International Intrusions Motives and Patterns Retrieved July 14, 2008, 2008, from http//www. aracnet. com/kea/Papers/paper. shtml Barba, M. (___). computing device Forensic Investigations Electronic Version. Retrieved July 14, 2008, from http//www. computer-forensic. com/old_site/presentations/ASIS_Presentation. pdf Sunblocksystems. com. (2007). Computer Forensics. Retrieved July 13, 2008, from http//www. sunblocksystems. com/forensics. html

No comments:

Post a Comment