ABSTRACT
This paper will discuss the need for computer forensics to be practiced in an effective and legal way, outline basic technical issues, and point to references for further reading. It promotes the idea that the competent practice of computer forensics and awareness of applicable laws is essential for today’s networked organizations.
This subject is important for managers who need to understand how computer forensics fits as a strategic element in overall organizational computer security. Network administrators and other computer security staff need to understand issues associated with computer forensics. Those who work in corporate governance, legal departments, or IT should find an overview of computer forensics in an organizational context useful.
TABLE OF CONTENTS
CERTIFICATION PAGE
DEDICATION
ACKNOWLEDGEMENT
ABSTRACT
CHAPTER ONE
1.1STATEMENT OF PROBLEM
1.2PURPOSE OF STUDY
1.3IMPORTANCE OF STUDY
1.4DEFINITION OF TERMS
1.5ASSUMPTION OF STUDY
CHAPTER TWO
2.0 LITERETURE REVIEW
2.1 OVERVIEW
2.2 DATA TYPES
CHAPTER THREE
3.0 LEGAL ASPECTS OF COMPUTER FORENSICS
CHAPTER FOUR
4.0 FORENSICS PROCESS
4.1 TECHNIQUES
4.2 VOLATILE DATA
4.3 ANALYSIS TOOLS
4.4 CERTIFICATIONS
CHAPTER FIVE: CONCLUSION
5.1LIMITATION OF STUDY
5.2SUGGESTION FOR FURTHER RESEARCH
5.3 REFERENCES
Disclaimer: Note this academic material is intended as a guide for your academic research work. Do not copy word for word. Note: For Computer or Programming related works, some works might not contain source codes
CITE THIS WORK
(2012, 11). Computer Forensics.. ProjectStoc.com. Retrieved 11, 2012, from https://projectstoc.com/read/313/computer-forensics
"Computer Forensics." ProjectStoc.com. 11 2012. 2012. 11 2012 <https://projectstoc.com/read/313/computer-forensics>.
"Computer Forensics.." ProjectStoc.com. ProjectStoc.com, 11 2012. Web. 11 2012. <https://projectstoc.com/read/313/computer-forensics>.
"Computer Forensics.." ProjectStoc.com. 11, 2012. Accessed 11, 2012. https://projectstoc.com/read/313/computer-forensics.
- Related Works
- Design And Implementation Of Video And Photo Editing
- Dynamic Signature Verification Using Pattern Recognition
- Design And Implementation Of A Web-based Legal Practitioner Application System
- Design And Implementation Of Computerized Banking Monitor Information System (a Case Study Of Central Bank Plc Enugu).
- Design And Implementation Of Web Test Tool Application Design And Measure Performance (case Study Of Kiamotors Enugu)
- Design And Implementation Of A Computerized Financial Management System For Public Institutions (a Case Study Of Unth, Enugu)
- Design And Implementaion Of Computerilized Livestock Management Information System
- Electronic Payment System Security
- Design And Implementation Of A Computer Based Loan Scheme Management System (a Case Study Of Harvard Trust Bank Enugu)
- Active Source Routing Protocol For Mobile Ad Hoc