COMPUTER FORENSICS

ABSTRACT
This paper will discuss the need for computer forensics to be practiced in an effective and legal way, outline basic technical issues, and point to references for further reading. It promotes the idea that the competent practice of computer forensics and awareness of applicable laws is essential for today’s networked organizations.
This subject is important for managers who need to understand how computer forensics fits as a strategic element in overall organizational computer security. Network administrators and other computer security staff need to understand issues associated with computer forensics. Those who work in corporate governance, legal departments, or IT should find an overview of computer forensics in an organizational context useful.


TABLE OF CONTENTS

CERTIFICATION PAGE
DEDICATION
ACKNOWLEDGEMENT
ABSTRACT

CHAPTER ONE
1.1STATEMENT OF PROBLEM
1.2PURPOSE OF STUDY
1.3IMPORTANCE OF STUDY
1.4DEFINITION OF TERMS
1.5ASSUMPTION OF STUDY

CHAPTER TWO
2.0 LITERETURE REVIEW
2.1 OVERVIEW
2.2 DATA TYPES

CHAPTER THREE
3.0 LEGAL ASPECTS OF COMPUTER FORENSICS

CHAPTER FOUR
4.0 FORENSICS PROCESS
4.1 TECHNIQUES
4.2 VOLATILE DATA
4.3 ANALYSIS TOOLS
4.4 CERTIFICATIONS

CHAPTER FIVE: CONCLUSION
5.1LIMITATION OF STUDY
5.2SUGGESTION FOR FURTHER RESEARCH
5.3 REFERENCES

Overall Rating

0

5 Star
(0)
4 Star
(0)
3 Star
(0)
2 Star
(0)
1 Star
(0)
APA

Research, A. (2018). COMPUTER FORENSICS. Afribary. Retrieved from https://afribary.com/works/computer-forensics

MLA 8th

Research, Afri "COMPUTER FORENSICS" Afribary. Afribary, 03 Feb. 2018, https://afribary.com/works/computer-forensics. Accessed 26 Dec. 2024.

MLA7

Research, Afri . "COMPUTER FORENSICS". Afribary, Afribary, 03 Feb. 2018. Web. 26 Dec. 2024. < https://afribary.com/works/computer-forensics >.

Chicago

Research, Afri . "COMPUTER FORENSICS" Afribary (2018). Accessed December 26, 2024. https://afribary.com/works/computer-forensics