ABSTRACT
This paper will discuss the need for computer forensics to be practiced in an effective and legal way, outline basic technical issues, and point to references for further reading. It promotes the idea that the competent practice of computer forensics and awareness of applicable laws is essential for today’s networked organizations.
This subject is important for managers who need to understand how computer forensics fits as a strategic element in overall organizational computer security. Network administrators and other computer security staff need to understand issues associated with computer forensics. Those who work in corporate governance, legal departments, or IT should find an overview of computer forensics in an organizational context useful.
TABLE OF CONTENTS
CERTIFICATION PAGE
DEDICATION
ACKNOWLEDGEMENT
ABSTRACT
CHAPTER ONE
1.1STATEMENT OF PROBLEM
1.2PURPOSE OF STUDY
1.3IMPORTANCE OF STUDY
1.4DEFINITION OF TERMS
1.5ASSUMPTION OF STUDY
CHAPTER TWO
2.0 LITERETURE REVIEW
2.1 OVERVIEW
2.2 DATA TYPES
CHAPTER THREE
3.0 LEGAL ASPECTS OF COMPUTER FORENSICS
CHAPTER FOUR
4.0 FORENSICS PROCESS
4.1 TECHNIQUES
4.2 VOLATILE DATA
4.3 ANALYSIS TOOLS
4.4 CERTIFICATIONS
CHAPTER FIVE: CONCLUSION
5.1LIMITATION OF STUDY
5.2SUGGESTION FOR FURTHER RESEARCH
5.3 REFERENCES
Disclaimer: Note this academic material is intended as a guide for your academic research work. Do not copy word for word. Note: For Computer or Programming related works, some works might not contain source codes
CITE THIS WORK
(2012, 11). Computer Forensics.. ProjectStoc.com. Retrieved 11, 2012, from https://projectstoc.com/read/313/computer-forensics
"Computer Forensics." ProjectStoc.com. 11 2012. 2012. 11 2012 <https://projectstoc.com/read/313/computer-forensics>.
"Computer Forensics.." ProjectStoc.com. ProjectStoc.com, 11 2012. Web. 11 2012. <https://projectstoc.com/read/313/computer-forensics>.
"Computer Forensics.." ProjectStoc.com. 11, 2012. Accessed 11, 2012. https://projectstoc.com/read/313/computer-forensics.
- Related Works
- Mesh Topology: Its Principles, Merits And Setbacks
- Design And Implementation Of A Computerized Modern Poultry Farm (a Case Study Imo Poultry Farm Ltd)
- Multimedia Conferencing
- The Design And Implementation Of Computerized Personnel Management System (a Case Study Of Project Development Institute Proda)
- Design And Implementation Of A Computerized Information System For A Human Right Based Organisation
- Design And Implementation Of A Computer Based Loan Scheme Management System (a Case Study Of Harvard Trust Bank Enugu)
- Design And Simulation Of Cache Updating For The Dynamic Source Routing Protocol
- Design An Implementation Of A Computer Based Seaport Billing System (a Case Study Of Nigerian Port Authority Lagos)
- Design And Implementation Of Student’s Transcript Generating Software (a Case Study Of I.m.t)
- Design And Implementation Of A Computerized Financial Management System For Public Institutions (a Case Study Of Unth, Enugu)
