ABSTRACT
This paper will discuss the need for computer forensics to be practiced in an effective and legal way, outline basic technical issues, and point to references for further reading. It promotes the idea that the competent practice of computer forensics and awareness of applicable laws is essential for today’s networked organizations.
This subject is important for managers who need to understand how computer forensics fits as a strategic element in overall organizational computer security. Network administrators and other computer security staff need to understand issues associated with computer forensics. Those who work in corporate governance, legal departments, or IT should find an overview of computer forensics in an organizational context useful.
TABLE OF CONTENTS
CERTIFICATION PAGE
DEDICATION
ACKNOWLEDGEMENT
ABSTRACT
CHAPTER ONE
1.1STATEMENT OF PROBLEM
1.2PURPOSE OF STUDY
1.3IMPORTANCE OF STUDY
1.4DEFINITION OF TERMS
1.5ASSUMPTION OF STUDY
CHAPTER TWO
2.0 LITERETURE REVIEW
2.1 OVERVIEW
2.2 DATA TYPES
CHAPTER THREE
3.0 LEGAL ASPECTS OF COMPUTER FORENSICS
CHAPTER FOUR
4.0 FORENSICS PROCESS
4.1 TECHNIQUES
4.2 VOLATILE DATA
4.3 ANALYSIS TOOLS
4.4 CERTIFICATIONS
CHAPTER FIVE: CONCLUSION
5.1LIMITATION OF STUDY
5.2SUGGESTION FOR FURTHER RESEARCH
5.3 REFERENCES
Disclaimer: Note this academic material is intended as a guide for your academic research work. Do not copy word for word. Note: For Computer or Programming related works, some works might not contain source codes
CITE THIS WORK
(2012, 11). Computer Forensics.. ProjectStoc.com. Retrieved 11, 2012, from https://projectstoc.com/read/313/computer-forensics
"Computer Forensics." ProjectStoc.com. 11 2012. 2012. 11 2012 <https://projectstoc.com/read/313/computer-forensics>.
"Computer Forensics.." ProjectStoc.com. ProjectStoc.com, 11 2012. Web. 11 2012. <https://projectstoc.com/read/313/computer-forensics>.
"Computer Forensics.." ProjectStoc.com. 11, 2012. Accessed 11, 2012. https://projectstoc.com/read/313/computer-forensics.
- Related Works
- Design And Implementation Of Protocol Scrubbing: Network Security Through Transparent Flow Modification
- Issues Involved In Upgrading A Computer
- Automatic Dependent Surveillance Broadcasting (adsb)
- Design And Implementation Of A Computer Based Library Indexing System (a Case Study Of Imt Library, Enugu)
- E-mail Server Using Threaded Sockets
- Industrial Application Using Neural Networks
- Design And Implementation Of A Computerized Personnel Auditing System Of A Local Government Administeration
- Web Based Credit Card System
- Design And Implementation Of Computerized Front Management Information System (hotel)
- Impact Of Computerized Physician Documentation In Some Selected Government And Private Hospitals In Kano State