ABSTRACT
This paper will discuss the need for computer forensics to be practiced in an effective and legal way, outline basic technical issues, and point to references for further reading. It promotes the idea that the competent practice of computer forensics and awareness of applicable laws is essential for today’s networked organizations.
This subject is important for managers who need to understand how computer forensics fits as a strategic element in overall organizational computer security. Network administrators and other computer security staff need to understand issues associated with computer forensics. Those who work in corporate governance, legal departments, or IT should find an overview of computer forensics in an organizational context useful.
TABLE OF CONTENTS
CERTIFICATION PAGE
DEDICATION
ACKNOWLEDGEMENT
ABSTRACT
CHAPTER ONE
1.1STATEMENT OF PROBLEM
1.2PURPOSE OF STUDY
1.3IMPORTANCE OF STUDY
1.4DEFINITION OF TERMS
1.5ASSUMPTION OF STUDY
CHAPTER TWO
2.0 LITERETURE REVIEW
2.1 OVERVIEW
2.2 DATA TYPES
CHAPTER THREE
3.0 LEGAL ASPECTS OF COMPUTER FORENSICS
CHAPTER FOUR
4.0 FORENSICS PROCESS
4.1 TECHNIQUES
4.2 VOLATILE DATA
4.3 ANALYSIS TOOLS
4.4 CERTIFICATIONS
CHAPTER FIVE: CONCLUSION
5.1LIMITATION OF STUDY
5.2SUGGESTION FOR FURTHER RESEARCH
5.3 REFERENCES
Disclaimer: Note this academic material is intended as a guide for your academic research work. Do not copy word for word. Note: For Computer or Programming related works, some works might not contain source codes
CITE THIS WORK
(2012, 11). Computer Forensics.. ProjectStoc.com. Retrieved 11, 2012, from https://projectstoc.com/read/313/computer-forensics
"Computer Forensics." ProjectStoc.com. 11 2012. 2012. 11 2012 <https://projectstoc.com/read/313/computer-forensics>.
"Computer Forensics.." ProjectStoc.com. ProjectStoc.com, 11 2012. Web. 11 2012. <https://projectstoc.com/read/313/computer-forensics>.
"Computer Forensics.." ProjectStoc.com. 11, 2012. Accessed 11, 2012. https://projectstoc.com/read/313/computer-forensics.
- Related Works
- Flat File Database System Vs Relational Database System
- Design And Implementation Of A Computerized Cargo Transportation Management System (a Case Study Of Super Maritime Shipping Agency, Lagos)
- Distributed Collaborative Key Agreement And Authentication Protocol For Dynamic Peer Group
- Design And Implementation Of A Computerized Farm Management Information System ( A Case Study Of A Piggry Farm)
- Image Stream Transfer Using Real Time Transmission Protocol
- Advantages And Disadvantages Of Off The Shelf Software And Customized Software
- Design And Implementation Of Computerized Livestock Management Information System
- Design And Implementation Of A Computer Assisted Learning System (case Study Of Tutorial On Primary School Mathematics)
- Design And Implementation Of An Online Student Record System. (a Case Study Of Imt Enugu, Enugu State)
- Design And Implementation Of A Computerized Procedure For Privatization Of A Corporate Enterprise (a Case Study Of Nitel Ltd Enugu)