Question

Why is it important to actively investigate suspect computers while they are on the network?

Why is it important to actively investigate suspect computers while they are on the network?

Homework Answers

Answer #1

Why it is important to actively invastigate suspect computers while they are on the network :-

  • It is important to actively invastigate suspect computers while they are on the network because computer network has grown so the criminl or hackers have opportuninty for electronic crime.
  • And the attacker can commit these criminal activity through online. Criminals can share the information and gather identity and information of victims .
  • The computer crime can be done through -- websites, chat rooms, file sharing networks, e-mail.
  • To actively invastigate suspect computers we need report, and this report is developed by technical working group for the investigation of crime which is related to high technology.
  • This investigation process include -- Forensic examination of digital evidence, Internet and network invastigation, Investigative use of technology, Electronic crime investigation by first responder.
  • While investigating the suspected computer, the investigator should aware that the criminal may use the network for diiferent reason -- sharing of information like documents, photographs, sound files, movies, text and graphic files and the software programs.
  • The investigation of suspect computers allow controls on suspected activity, social control, recognize and monitor threats and prevent and investigate criminal activity.
  • This activity can be control using various programs like - total information awareness program and the technology which include high speed surveillance computers and biomatrics softwares.  
  • Digital forensic -- In digital forensic the researcher gather data about cybercrime then check the digital system that were affected.
  • This process invloves analyzation of network connection, raw data, hard drives, file system, cahing devices and RAM memory.
  • The researchers look for fingerprints in the system files, emails, web browsing history, network and service logs.
Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
What is the Network for Regional Healthcare Improvement? Why was it created? Why is it important...
What is the Network for Regional Healthcare Improvement? Why was it created? Why is it important to the PX? Be thorough in your response, especially the last question :)
Why are all 7 titles of the Aging Network important, individually and as a unit?
Why are all 7 titles of the Aging Network important, individually and as a unit?
Network management: Why it is important? whether you have a LAN, MAN or WAN, do you...
Network management: Why it is important? whether you have a LAN, MAN or WAN, do you still need a network management on those networks, and how does it help ?
A lab network consisting of 20 computers was attacked by a computer virus. This virus enters...
A lab network consisting of 20 computers was attacked by a computer virus. This virus enters each computer with probability 0.8, independently of other computers. What are the expectation and variance of the number of attacked computers? Find the probability that the virus enters at most 18 computers. Show work below.  
4. While ethical behavior is important for everyone in an organization, why is it especially important...
4. While ethical behavior is important for everyone in an organization, why is it especially important for leaders? minimum of 2 paragraphs
Can the network 192.168.30.0 and the network 193.168.30.0 be aggregated together? Why or why not? Network...
Can the network 192.168.30.0 and the network 193.168.30.0 be aggregated together? Why or why not? Network + Guide to networks seventh addition chapter 10 Network segmentation
Which of the following is the most important reason why it is virtually impossible for one...
Which of the following is the most important reason why it is virtually impossible for one entity in a blockchain network to unilaterally alter a document after it has been recorded and validated in a new block of transactions? a. The use of a nonce to validate each block b. The existence of multiple copies of the blockchain on many different computers c. Digital signatures d. Digital certificate
- Why is it important to avoid touching the spots with mobile phase while putting the...
- Why is it important to avoid touching the spots with mobile phase while putting the plate in the chamber?
Internet is said to be a worldwide interconnected network of computers that allows a computer in...
Internet is said to be a worldwide interconnected network of computers that allows a computer in one part of the world to communicate with a computer located somewhere in the world but it cannot work alone. In a your own words identify and discuss all the : Technologies           Devices           Software           Applications that make the internet work
Why are standards important for globalization?  Also, while standards are ‘voluntary’ and appear to be beneficial or...
Why are standards important for globalization?  Also, while standards are ‘voluntary’ and appear to be beneficial or at least benign, might this process actually inhibit innovation?  What is the long-term implication of Huawei’s lead in 5G technology and standards?  
ADVERTISEMENT
Need Online Homework Help?

Get Answers For Free
Most questions answered within 1 hours.

Ask a Question
ADVERTISEMENT