Login

Join for Free!
112397 members
table of contents table of contents

Biology Articles » Bioethics » New Vision of Computer Forensic Science: Need of Cyber Crime Law » Techniques of Computer Forensic

Techniques of Computer Forensic
- New Vision of Computer Forensic Science: Need of Cyber Crime Law

Email Forensic Techniques

As a result of e-commerce transactions and email communications over the internet, a new type of virtual evidence has been created. Computer related investigations can involve the review of email folder achieves to determine internet policy abuses in businesses or government agencies. Using computer forensics procedures, processes and tools, the computer forensics specialist can identify fragments of email messages that were dumped from computer memory during past work sessions.

Internet Forensic Techniques

Since DOS and WINDOWS were never designed to be secure, Computer Scientists & Law Enforcement personnel could easily obtain information about internet content, web browsing and other activities from windows system. Even after data has been deleted, much information remains available for discovery of the Windows swap file. Windows swap files are dynamically created during the web session & then erased. These same files are then left behind as a large erased file in unallocated spaces. Unless specifically defragmented and written over, these erased swap files can be retrieved and archived for analysis.

Password cracking Techniques and Cryptanalysis

Password cracking is a problem facing by computer forensic scientist. Numerous programs are available on the internet for cracking passwords, including the Password Cracking Library (PCL) available at various web sites e.g. www.passwords-crackers.com.Cryptanalysis is one of two branches of cryptology that is concerned with breaking and defeating cryptography. Cryptanalysis can be an invaluable tool for Computer Forensic Scientists to penetrate encrypted files and passwords and Cryptanalyst is the attacker who is concerned with eavesdropping and breaking encrypted chipper text.

What is Cyber Crime & Computer crime?

The Encyclopedia Britannica defines Cyber crime as any crime that is committed by means of special knowledge or expert use of computer technology. United Nation Manual on prevention & Control of computer crime and Oxford Reference Online gives list of cyber crimes committed over internet.[ 1] Cyber crime includes a wide variety of criminal offenses and activities Because of lack of physical evidences investigating a cyber crime becomes very difficult. Scope of this definition becomes wider with a frequent companion or substitute term “computer-related crime”. Cyber crimes are harmful acts committed from or against a computer or network. Cyber Crimes differ from most terrestrial crimes in four ways:

  1. They are easy to learn how to commit.
  2. They require few resources relative to the potential damage caused.
  3. They can be committed in a jurisdiction without being physically present in it.
  4. They are often not clearly illegal.

A criminal might use a computer to keep track of the robberies a person committed or the drug person sold, which means that even stick-ups, breaking and entering and every drug transaction could be considered a computer crime [ 1].


rating: 5.00 from 1 votes | updated on: 27 Nov 2007 | views: 10463 |

Rate article:







excellent!bad…