This website uses cookies to ensure you have the best experience. Learn more

Intro To Computer Forensics Essay

880 words - 4 pages

- PAGE 4 -
{DATE\@ "06/03/2007"}Student's Name: Yasser AliyanAssignment Type: IPCryptography ConceptsUnit: 1Course: ITS660-0702A-01Dr. Prof: Jose M. NievesSpecial Topics in Network SecurityCover PageIntro to Computer Forensics{DATE\@ "06/03/2007"}Student's Name: Yasser AliyanAssignment Type: IPCryptography ConceptsUnit: 1Course: ITS660-0702A-01Dr. Prof: Jose M. NievesA computer virus is a damaging computer program. It is usually designed to make other software malfunction by attaching itself to any software within contact. Virus programs attack and destroy data in computer systems. They also have the capacity to spread out to other computer systems that have contact with the infected ones. Because of the dangerous damage they cause, computer virusesThere are three types of viruses; a boot sector virus which infects the boot program that starts the system. The virus then is loaded into the computer memory and spreads through any floppy disk. The second type is the file virus which inserts virus code into program files that spreads into any program accesses the infected file. Another type is the Trojan virus.Some viruses would cause computer systems to freeze temporarily, followed by a sound or message. Other viruses have a logic bomb which is an activity that takes place when a certain action takes place in the computer. A worm is like a virus which copies itself until there is no memory left on the computer.Antivirus programs have been developed to detect, repair and remove viruses. In case of an infected file that can not be removed, the antivirus program places it in a backup place. An antivirus program, such as Norton Antivirus, is very important on a computer. In addition to antivirus, personal and administrative practices and institutional polices should be established.Antivirus software can also protect one's computer from another person hacking it. Hacking a computer means breaking into the computer from another computer and having full control over it. Hackers can break into someone's computer and destroy the files that are there. Antivirus software will stop hackers from doing that. In fact, it will capture the location of the computer from which the hacker is trying to break into someone else's computer, and that person can then press charges against the hacker.There are three classes of anti-virus products: detection tools, identification tools, and removal tools. Scanners are an example of both detection and identification tools. Vulnerability monitors and modification detection programs are both examples of detection tools. Disinfectors are examples of a removal tools. (Hoffman, 1990)Today, computer systems are under attack from a multitude of sources. These attacks target different characteristics of a system. This leads to the possibility that a particular system is more susceptible to certain kinds of attacks. The macro viruses are not...

Find Another Essay On Intro to Computer Forensics

Computer Forensics Essay

1581 words - 6 pages The Internet is growing explosively, as is the number of crimes committed against or using computers. As a response to the growth of computer crime, the field of computer forensics has emerged. Computer forensics involves carefully collecting and examining electronic evidence that not only assesses the damage to a computer as a result of an electronic attack, but also to recover lost information from such a system to prosecute a criminal. With

Computer Forensics: Issues in Preserving Digital Evidence and Forensic Investigation

1931 words - 8 pages tools are not used and followed. An existing issue in FIT is computer forensics, in regards to preserving digital evidence and effectively conducting a computer forensics investigation. Computer forensics can be defined as the who, what, when, and how of digital (electronic) evidence and how techmology is used to preserve, authentic, and analyze the evidence collected (citation 17utah). If obtained evidence is not handled propely, this could

A History of the FBI Regional Computing Forensics Laboratory

1219 words - 5 pages forensics around computers, come to be in an age where certainly all major government establishments have, and are familiar with, computers and the technology associated within them. These are a few of the questions that will be answered throughout this research paper, along with an analysis of where they are today, and where it appears the future of these labs will take them. Computer Forensics is defined as “the application of computer

A Forensics Memory Study of Malware in Android Operating Systems

2744 words - 11 pages attacks when they occur on mature operating system platforms such as Windows and Linux. However, due to the immaturity of Android memory image forensics, it is relatively problematic and time consuming to conduct such investigations on Android systems. In this research, we take advantage of recent advances in Android memory forensics technologies to explore a sample of these malware attacks, utilizing the open source digital forensics Volatility, a

The NIST Computer Forensics Tool Testing Program

728 words - 3 pages In order for computer forensics findings to be admissible in a court of law, the tools and methods used to collect such data must ensure its integrity. According to Marie-Helen Maras (2012), “As with other forms of evidence, the original captured network traffic data must be kept intact. An investigator must ensure that any programs that are run to obtain evidence do not modify data on the system” (p.286). The National Institute of Standards

Criminal Justice Fields

978 words - 4 pages forensics relating to the recovery of digital evidence or data from a mobile device under forensically sound conditions. The use of phones in crime was widely recognized for some years, but the forensic study of mobile devices is relatively new field, dating from the early 2000s. Smartphones, the news technology in mobile devices, have caused a demand for forensic examination of the devices, which could not be met by existing computer forensics

Cloud Forensics

1033 words - 5 pages Detection System) or PDS (Intrusion Prevention System) solution to the network, which is only analysing traffic for malicious behaviour and alerting the provider of such activity. Storage Since there is no ultimate perfect computer crime, storage is the major reason why digital forensics hatched in the first place as data or trail would be left behind after any attack or intrusion. When hardware access to the machine is determined, one knows exactly

Data Acquisition

1869 words - 7 pages verified. In addition, failures can and do occur, so you should learn how to use several acquisition tools and methods. Storage Formats: The data a computer forensics acquisition tool collects is stored as an image file in one of three formats. Two formats are open source and the third is proprietary. Each vendor has unique features, so several different proprietary formats are available. Depending on the proprietary format, many computer

Digital Collection

935 words - 4 pages evidence collection is going to be the best course of action. Any well-training computer forensic technicians should not jump into a search without some kind approved policy procedure which will include a checklist or standard operating procedure that will methodically guide them throughout the examination procedure. The cyber forensics should not be taken lightly and it starts with its collection methods. 3. Evidence Gathering and Identification

Digital Evidence and Forensics

810 words - 4 pages INTRODUCTION: With the increase use of computers to commit crimes and growing demand for computer-based data in civil proceedings, crimes developed rapidly for forensics experts to extract useful information from computer evidence. The field of digital forensics has evolved to allow security professionals to examine evidence from the increasing plethora of digital devices to help determine what individuals might have done in the past. Some of

Technology and Science Unite: Solving Crimes

964 words - 4 pages Technology and Science Unite: Solving Crimes The focus of this paper will be on the development of forensics in the criminal justice profession, both past and present. The main focus will be on the roll technology has played in the updating and improvements in the field of DNA study, fingerprinting, and the newest concern of forensic teams, computer crimes. All levels of law enforcement depend on the technological improvements in forensics in

Similar Essays

Artificial Intelligence Applied To Computer Forensics

952 words - 4 pages Digital Investigation toolkit (MADIK) considered as computer forensics assistance by contribute a set of ISA systems perform various analyzes on digital evidence related to a case of distributed way.In MADIK, each ISA store experience learned of experts from certain crime investigation in the set of rules and a knowledge base whence digital evidences are similarities. MADIK using CBR allows agents to obtain more complete evidence in the particular

Intro To Computer Virus Essay

1571 words - 6 pages Virus What is a Virus? The computer virus is something that has been around almost as long as the Personal Computer (PC) and certainly since the advent of the affordable home computer, but what exactly is a virus? And how does it affect your PC? Is there any way to prevent your hard drive becoming infected and just where do they come from anyway? A virus is computer program, usually a very small program, that interferes with the smooth running

Cbsc301 Midterm Essay

1236 words - 5 pages Companies Specializing in Computer Forensics and Updates on Computer Crime Prosecution Computer forensics is defined as the act of analyzing digital information in an attempt to discover evidence and report the findings in a legally admissible form. Computer forensics teams are highly trained individuals with ongoing training that helps them keep up with the current trends in computer crime. Certifications qualify these individuals to conduct

Computer Crime Investigations Forensics Research Essay

546 words - 2 pages presented an opportunity for research of my choice in Computer Crime Investigations Forensics and Tools and Technology by preparing keys points, to define the business research and its purpose, explain the business problem(s) under investigation, identify the parties involved in conducting the research and describing the method(s) used to conduct the research.Research and PurposeThe Computer Crime Investigation Forensic Tools and Technology research