Question

Why is it important to actively investigate suspect computers while they are on the network?

Why is it important to actively investigate suspect computers while they are on the network?

Homework Answers

Answer #1

Why it is important to actively invastigate suspect computers while they are on the network :-

  • It is important to actively invastigate suspect computers while they are on the network because computer network has grown so the criminl or hackers have opportuninty for electronic crime.
  • And the attacker can commit these criminal activity through online. Criminals can share the information and gather identity and information of victims .
  • The computer crime can be done through -- websites, chat rooms, file sharing networks, e-mail.
  • To actively invastigate suspect computers we need report, and this report is developed by technical working group for the investigation of crime which is related to high technology.
  • This investigation process include -- Forensic examination of digital evidence, Internet and network invastigation, Investigative use of technology, Electronic crime investigation by first responder.
  • While investigating the suspected computer, the investigator should aware that the criminal may use the network for diiferent reason -- sharing of information like documents, photographs, sound files, movies, text and graphic files and the software programs.
  • The investigation of suspect computers allow controls on suspected activity, social control, recognize and monitor threats and prevent and investigate criminal activity.
  • This activity can be control using various programs like - total information awareness program and the technology which include high speed surveillance computers and biomatrics softwares.  
  • Digital forensic -- In digital forensic the researcher gather data about cybercrime then check the digital system that were affected.
  • This process invloves analyzation of network connection, raw data, hard drives, file system, cahing devices and RAM memory.
  • The researchers look for fingerprints in the system files, emails, web browsing history, network and service logs.
Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
What is the Network for Regional Healthcare Improvement? Why was it created? Why is it important...
What is the Network for Regional Healthcare Improvement? Why was it created? Why is it important to the PX? Be thorough in your response, especially the last question :)
Why are all 7 titles of the Aging Network important, individually and as a unit?
Why are all 7 titles of the Aging Network important, individually and as a unit?
Network management: Why it is important? whether you have a LAN, MAN or WAN, do you...
Network management: Why it is important? whether you have a LAN, MAN or WAN, do you still need a network management on those networks, and how does it help ?
4. While ethical behavior is important for everyone in an organization, why is it especially important...
4. While ethical behavior is important for everyone in an organization, why is it especially important for leaders? minimum of 2 paragraphs
A lab network consisting of 20 computers was attacked by a computer virus. This virus enters...
A lab network consisting of 20 computers was attacked by a computer virus. This virus enters each computer with probability 0.8, independently of other computers. What are the expectation and variance of the number of attacked computers? Find the probability that the virus enters at most 18 computers. Show work below.  
A connection between two or more computers on the same network connected via a cable and...
A connection between two or more computers on the same network connected via a cable and two computers in different parts of the world differs, Identify explain how the two connections types differ.
Can the network 192.168.30.0 and the network 193.168.30.0 be aggregated together? Why or why not? Network...
Can the network 192.168.30.0 and the network 193.168.30.0 be aggregated together? Why or why not? Network + Guide to networks seventh addition chapter 10 Network segmentation
5.9. (Computer project) Twenty computers are connected in a network. One computer be- comes infected with...
5.9. (Computer project) Twenty computers are connected in a network. One computer be- comes infected with a virus. Every day, this virus spreads from any infected computer to any uninfected computer with probability 0.1. Also, every day, a computer technician takes 5 infected computers at random (or all infected computers, if their number is less than 5) and removes the virus from them. Estimate: (a) the expected time it takes to remove the virus from the whole network; (b) the...
What is a “computer network”? Why are computer networks important to business? How do you see...
What is a “computer network”? Why are computer networks important to business? How do you see networks used at businesses? Did any of the uses surprise you? How were those tasks accomplished before computer networks?
Which of the following is the most important reason why it is virtually impossible for one...
Which of the following is the most important reason why it is virtually impossible for one entity in a blockchain network to unilaterally alter a document after it has been recorded and validated in a new block of transactions? a. The use of a nonce to validate each block b. The existence of multiple copies of the blockchain on many different computers c. Digital signatures d. Digital certificate
ADVERTISEMENT
Need Online Homework Help?

Get Answers For Free
Most questions answered within 1 hours.

Ask a Question
ADVERTISEMENT