Welcome to biology-online.org! Please login to access all site features. Create an account.
Log me on automatically each visit
A Cyber space is a virtual space that has become as important …
Biology Articles » Bioethics » New Vision of Computer Forensic Science: Need of Cyber Crime Law » Techniques of Computer Forensic
As a result of e-commerce transactions and email communications over the internet, a new type of virtual evidence has been created. Computer related investigations can involve the review of email folder achieves to determine internet policy abuses in businesses or government agencies. Using computer forensics procedures, processes and tools, the computer forensics specialist can identify fragments of email messages that were dumped from computer memory during past work sessions.
Since DOS and WINDOWS were never designed to be secure, Computer Scientists & Law Enforcement personnel could easily obtain information about internet content, web browsing and other activities from windows system. Even after data has been deleted, much information remains available for discovery of the Windows swap file. Windows swap files are dynamically created during the web session & then erased. These same files are then left behind as a large erased file in unallocated spaces. Unless specifically defragmented and written over, these erased swap files can be retrieved and archived for analysis.
Password cracking is a problem facing by computer forensic scientist. Numerous programs are available on the internet for cracking passwords, including the Password Cracking Library (PCL) available at various web sites e.g. www.passwords-crackers.com.Cryptanalysis is one of two branches of cryptology that is concerned with breaking and defeating cryptography. Cryptanalysis can be an invaluable tool for Computer Forensic Scientists to penetrate encrypted files and passwords and Cryptanalyst is the attacker who is concerned with eavesdropping and breaking encrypted chipper text.
The Encyclopedia Britannica defines Cyber crime as any crime that is committed by means of special knowledge or expert use of computer technology. United Nation Manual on prevention & Control of computer crime and Oxford Reference Online gives list of cyber crimes committed over internet.[ 1] Cyber crime includes a wide variety of criminal offenses and activities Because of lack of physical evidences investigating a cyber crime becomes very difficult. Scope of this definition becomes wider with a frequent companion or substitute term “computer-related crime”. Cyber crimes are harmful acts committed from or against a computer or network. Cyber Crimes differ from most terrestrial crimes in four ways:
A criminal might use a computer to keep track of the robberies a person committed or the drug person sold, which means that even stick-ups, breaking and entering and every drug transaction could be considered a computer crime [ 1].
rating: 5.00 from 1 votes | updated on: 27 Nov 2007 | views: 12098 |
share this article | email to friends
suggest a revision
print this page
print the whole article
© Biology-Online.org. All Rights Reserved. Register | Login | About Us | Contact Us | Link to Us | Disclaimer & Privacy