Sunday, March 24, 2019
Tools in Wide Distribution Computer Forensics in Taiwan :: Technology Computers Essays
Tools in full(a) Distribution Computer Forensics in Taiwan Back in the age when all calculators be pretty much standalone entities in the solid ground, each unit is self-contained and does not pose much threat. Similarly in politics, when patches of trivial disgruntle tribal groups here and there are kept in isolation, there was not much threat to a dominating unconnected government. However, when the net becomes available to all computer users around the world, it is like unification all the little tribal groups under one umbrella and the electromotive force threat is much greater. Now the disgruntled group can kitty resources and recruit an army to overthrow the foreign government. The government get out fight down to natter more security measures and bring in more knights and smash artillery to maintain order. Similarly, cyber criminals can now have access to the world and can communicate with other criminals across the globe in conspiring against certain insti tute for whatever purposes. Then inhumenet security communities will impose more secure measures such as meshwork secure configurations (DMZ), honey-pots (traps or bait for the unknowing cyber-criminal), or implement more secure software package so that cyber attacks is mitigated. These security measures taken both by the government and the internet security community provide preventive measures, at best. What happens when this line of denial is breached? unity can take all the vitamin c to prevent from acquiring a cold, but what happens on the day when a cold is caught? One goes to the doctor and gets antibiotics and cold medicine to combat the virus the government will try to bring in more troops to combat the rebellion. However, what of the inter world? That is where computer forensics comes in, to treat/fix the hole and bring the perpetrator to justice. Therefore, where software security bring forth prevention, computer forensics, incidence response, calls for treatment. Wh at scarcely is computer forensics? It is a toolbox of science, which contains tools and methodologies to recover both passwords and deleted data, to analyze network traffic and logon/logoff times, to snoop and sniff out, as undercover agents do, rotten apples in the barrel. Due to the nature of each incident, the nature of the case may be legal, political, business, or technical oriented. Consequently, one could gather how much a computer means in peoples lifestyles nowadays. Nevertheless, computer forensics team (aka incident response team) are popping up around the world, due to the global nature of the internet, which makes it a lot harder for topical anesthetic law authorities to oversea and prosecute local crimes executed remotely outside the country.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.