Tuesday, February 12, 2019
Tools in Wide Distribution Computer Forensics in Taiwan :: Technology Computers Essays
Tools in Wide Distribution Computer Forensics in Taiwan anchor in the days when all ready reckoners are pretty much(prenominal) standal ace entities in the world, each unit is self-contained and does not pose much threat. as well in politics, when patches of little disgruntle tribal multitudes here and there are kept in isolation, there was not much threat to a dominating foreign political science. However, when the internet becomes available to all computer users near the world, it is like uniting all the little tribal groups under one umbrella and the potential threat is much greater. Now the disgruntled group can pool resources and recruit an army to overthrow the foreign government. The government will react to impose much tribute measures and bring in more knights and better artillery to maintain order. Similarly, cyber criminals can now subscribe access to the world and can communicate with other criminals across the egg in conspiring against certain institute fo r whatever purposes. Then internet security communities will impose more secure measures such as interlock secure configurations (DMZ), honey-pots (traps or bait for the unknowing cyber-criminal), or implement more secure software so that cyber attacks is mitigated. These security measures taken both(prenominal) by the government and the internet security community provide preventive measures, at best. What happens when this line of defense is breached? One can take all the vitamin c to prevent from getting a cold, but what happens on the day when a cold is caught? One goes to the doctor and gets antibiotics and cold medicine to combat the virus the government will try to bring in more troops to combat the rebellion. However, what of the inter world? That is where computer forensics comes in, to treat/fix the tidy sum and bring the culprit to justice. Therefore, where software security bring forth prevention, computer forensics, incidence response, calls for treatment. What exa ctly is computer forensics? It is a toolbox of science, which contains tools and methodologies to recover both passwords and deleted data, to analyze network traffic and logon/logoff times, to snoop and sniff out, as clandestine agents do, rotten apples in the barrel. Due to the nature of each ensuant, the nature of the cause may be legal, political, business, or technical oriented. Consequently, one could gather how much a computer means in peoples lifestyles nowadays. Nevertheless, computer forensics team (aka incident response team) are popping up around the world, due to the world-wide nature of the internet, which makes it a lot harder for local law authorities to overseas and prosecute local crimes executed remotely outside the country.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment