Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 6

Computer forensics (also known as computer forensic science) is a branch of digital forensic science

about the evidence found on computers and digital storage media.

A survey conducted by the office for National Statistics there were an estimated 3.6 million cases of
fraud and two million computer misuse offences in a year.

The aim of digital forensic investigation is to extract evidences from information and use these
evidences in the court of law.

Identification

It is the first step in the forensic process. The identification process mainly includes things like what
evidence is present, where it is stored, and lastly, how it is stored (in which format).

Electronic storage media can be personal computers, Mobile phones, PDAs, etc.

Preservation

In this phase, data is isolated, secured, and preserved. It includes preventing people from using the
digital device so that digital evidence is not tampered with.

Analysis

In this step, investigation agents reconstruct fragments of data and draw conclusions based on evidence
found. However, it might take numerous iterations of examination to support a specific crime theory.

Documentation

In this process, a record of all the visible data must be created. It helps in recreating the crime scene and
reviewing it. It Involves proper documentation of the crime scene along with photographing, sketching,
and crime-scene mapping.

Presentation

In this last step, the process of summarization and explanation of conclusions is done.

However, it should be written in a layperson’s terms using abstracted terminologies. All abstracted
terminologies should reference the specific details.

Computer Forensics is a scientific method of investigation and analysis in order to gather evidence from
the digital devices or computer networks and components which is suitable for presentation in a court
of law or legal body.
It involves performing a structured investigation while maintaining a documented chain of evidence to
find out exactly what happened on a computer and who was responsible for it.
Disk Forensics: It deals with extracting raw data from primary or secondary storage of the device by
searching active, modified, or deleted files.

Network Forensics: It is a sub-branch of Computer Forensics which involves monitoring and analyzing
the computer network traffic.

Database Forensics: It deals with the study and examination of databases and their related metadata.

Malware Forensics: It deals with the identification of suspicious code and studying viruses, worms, etc.

Email Forensics: It deals with emails and its recovery and analysis, including deleted emails, calendars,
and contacts.

Memory Forensics: Deals with collecting data from system memory (system registers, cache, RAM) in
raw form and then analyzing it for further investigation.

Identification: Identifying what evidence is present, where it is stored, how it is stored (in which format).
Electronic devices can be personal computers, Mobile phones, PDAs, etc.

Preservation: Data is isolated, secured, and preserved. It includes prohibiting unauthorized personnel
from using the digital device so that digital evidence, mistakenly or purposely, is not tampered with and
making a copy of the original evidence.

Analysis: Forensic lab personnel reconstruct fragment of data and draw conclusions based on evidence.

Documentation: A record of all the visible data is created. It helps in recreating and reviewing the crime
scene. All the findings from the investigations are documented.

Presentation: All the documented findings are produced in a court of law for further investigations.

APPLICATIONS

Intellectual Property theft

Industrial espionage

Employment disputes

Fraud investigations

Misuse of the Internet and email in the workplace

Forgeries related matters

Bankruptcy investigations

Issues concern with the regulatory compliance


Internet browsing security measures

Reading privacy policies and terms and conditions

Password hygiene

Use of location services

Managing privacy on social media accounts

Providing false or limited personal information.

We need computer forensics for the same reasons we need physical forensics at a crime scene. Forensic
examiners are specially trained in the collection, processing, analysis and reporting of digital evidence in
crimes where computers or mobile phones are used. There are hundreds of artifacts available on these
devices that tell a story. The examiners job is to understand why and how those artifacts are there and
help others to understand what happened so that the truth can be revealed and justice be served. The
faster and more thorough a computer forensics’ investigation is, the better the chances of the hacker
being caught and any damages being repaired and that is why digital forensics is important.

the uses of computer forensics include the following:

Detecting a cybercrime

Solving an alleged criminal activity provided the medium used in perpetrating the crime is a digital
device

Forestalling a crime from taking place

Computer forensics investigations are often used to refute or support a supposition during civil, criminal
and corporate litigations

Computer forensics is used in the private sector by companies who are undergoing internal
investigations into unauthorized technical and network transgressions.

Noblett MG, Pollitt MM, Presley LA. Recovering and examining computer forensic evidence. Forensic
Science Communications. 2000 Oct 1;2(4).

Kruse II WG, Heiser JG. Computer forensics: incident response essentials. Pearson Education; 2001 Sep
26.

Dixon PD. An overview of computer forensics. IEEE Potentials. 2005 Dec;24(5):7-10.

Chigozie-Okwum CC, Michael DO, Ugboaja SG. Computer forensics investigation; implications for
improved cyber security in Nigeria. AFRREV STECH: An International Journal of Science and
Technology. 2017 Apr 10;6(1):59-73.

Black C, Setterfield L, Warren R. Online data privacy from attitudes to action: An evidence review.
Carnegie UK Trust. 2018.
Can anyone tell me which of the following universities I can defer in the upcoming winter
semester?

1. FAU
2. Ludwing Maximilians University
3. University of Potsdam
4. Freie University of Berlin
5. Trier University
6. University of Passao
7. University of Bielefield

Regarding Deferral System

Sir/Madam,

I am MAINUL ISLAM MAHI, a master's program applicant from Bangladesh. I have a question regarding
the deferral system at the Freie University of Berlin. I want to apply for the MSc in Data Science program
in the winter 2022 semester. We have a long visa processing time in our country due to the COVID
pandemic. So, my question is: if I will get an admission offer letter from your university and don't get a
visa before enrolling in my courses, can I be able to defer my admission to the Summer 2023 semester?
Or do I have to apply again in the summer 2023 semester?

It will be a great pleasure if you reply to this mail.

Thank you for your time.

Regards,

MAINUL ISLAM MAHI

Sir/Madam,

I am MAINUL ISLAM MAHI, a master's program applicant from Bangladesh. I have a question regarding
the deferral system at the Universität Würzburg. I want to apply for the MSc in Computer
Science program in the winter 2022 semester. We have a long visa processing time in our country due to
the COVID pandemic. So, my question is: if I will get an admission offer letter from your university and
don't get a visa before enrolling in my courses, can I be able to defer my admission to the Summer 2023
semester? Or do I have to apply again in the summer 2023 semester?

It will be a great pleasure if you reply to this mail.

Thank you for your time.

 
Regards,

MAINUL ISLAM MAHI

Preventing Hackers

With digital forensics, cyber security companies have been able to develop technology that prevents
hackers from accessing a website, network, or device. By knowing the trends of how cyber criminals
steal or exploit data, cyber security software firms are able to protect relevant data and scan networks
to ensure that outside parties cannot access it.

Preventing Malware

Antimalware software is one of the biggest benefits resulting from digital forensics. Forensic analysis
helps identify how a virus enters and behaves in a network infrastructure. The software developed as a
result can detect malware and spyware and remove it before a vulnerability can be exploited.

Retrieving Deleted Information

For any digital investigation, it is crucial to recover deleted information – especially in a data breach or in
case of identity theft. Digital forensics uses complex tools and techniques to recover information and
present it in the court of law or even in situations without court cases where recovery of data is
essential.

Identifying Vulnerabilities

Vulnerabilities are often not apparent, thus making it easy for hackers to exploit them. Forensic analysis
techniques provide valuable information to present typical weak areas in an infrastructure, application,
or website. Based upon this information, security software can pay attention to fix these vulnerable
areas.

Cognitive Load Theory (CLT) and Human-Computer Interaction (HCI) concepts need to be combined to
understand better how students learn in more complex environments. For this reason, this paper
combines Cognitive Load Theory (CLT) and Human-Computer Interaction (HCI). The primary purpose of
this paper was to reduce the student’s cognitive load through a lecture note. With the help of HCI
design-centered principles on a lecture note, we have implemented the lecture note to lessen students’
cognitive load. The lecture note could be an example of how HCI can be designed in a lecture note. This
paper has discussed the research questions with several learning theories that measured students’
cognitive load. Based on learning theories and HCI design principles, we have developed two lecture
notes; the first is HCI design-based, and the second is in the absence of HCI design principles. The reason
for making two lecture notes is to observe which lecture note is reducing or increasing students’
cognitive load when we may conduct the survey1. The survey was performed among some
undergraduate students. When studied, the cognitive load was lowered among the student in lecture
one, where the HCI design concepts were applied, and the average cognitive efficiency was 1.52 from
143 participants. And the lecture note two, where HCI design principles did not apply, has increased
students’ cognitive load. The cognitive efficiency of lecture note two was 0.60 from 112 participants,
which illustrates the importance of HCI in lecture notes.

Dear Hiring Manager,

My name is Mainul Islam Mahi and I am applying for your Officer IT & Admin that I heard about from
[insert the person who told you about the post or mention the website you saw it on]. I have an
excellent record of [insert your relevant achievements] and know that my skills and knowledge would
benefit your company.

Attached, please find my resume and [insert other relevant documents like a cover letter or a
competence test]. Should you require anything else, do let me know.

I look forward to discussing further details about [insert how you plan on helping your new employer in
his or her ventures].

Sincerely,

[Insert your full name]


[Insert your current job title if relevant]
[Insert link to your LinkedIn profile/another relevant website]
[Insert email address]
[Insert contact number]

You might also like