Four main steps in computer forensics
1. Acquisition : physically or remotely obtaining possession of the computer, all network mapping from the system and external physical storage
2. Identification : identify data that is recoverable and retrieved by using forensic tools
3. Evaluation :evaluated the recorded data to if could be used again as evidence
4. Presentation : presenting evidence to the lawyers in a manner that is understandable by the non-technical experts.
lydiajane74 answered the question on May 4, 2018 at 18:48
-
Properties of a firewall
(Solved)
Properties of a firewall
Date posted:
May 4, 2018
.
Answers (1)
-
Define controversial content
(Solved)
Define controversial content.
Date posted:
April 28, 2018
.
Answers (1)
-
State the methods of verification giving examples
(Solved)
State the methods of verification giving examples
Date posted:
April 28, 2018
.
Answers (1)
-
What is verification?
(Solved)
What is verification?
Date posted:
April 28, 2018
.
Answers (1)
-
State the examples of biometric devices
(Solved)
State the examples of biometric devices
Date posted:
April 28, 2018
.
Answers (1)
-
How does computer technology threaten the privacy of our data?
(Solved)
How does computer technology threaten the privacy of our data?
Date posted:
April 28, 2018
.
Answers (1)
-
Define privacy
(Solved)
Define privacy
Date posted:
April 28, 2018
.
Answers (1)
-
Define law
(Solved)
Define law
Date posted:
April 26, 2018
.
Answers (1)
-
Define Ethics
(Solved)
Define Ethics
Date posted:
April 26, 2018
.
Answers (1)
-
Explain the impact of ICT on the society
(Solved)
Explain the impact of ICT on the society.
Date posted:
April 26, 2018
.
Answers (1)
-
Explain the Usage of ICT in Daily Life
(Solved)
Explain the Usage of ICT in Daily Life.
Date posted:
April 26, 2018
.
Answers (1)
-
Describe the evolution of computer
(Solved)
Describe the evolution of computer
Date posted:
April 26, 2018
.
Answers (1)
-
There are two styles commonly used in LATEX to write bibliography. Name them and giving a valid reason explain which one is more flexible.
(Solved)
There are two styles commonly used in LATEX to write bibliography. Name them and giving a valid reason explain which one is more flexible.
Date posted:
April 24, 2018
.
Answers (1)
-
State six risks to the information
(Solved)
State six risks to the information.
Date posted:
April 24, 2018
.
Answers (1)
-
Define windows firewall and explain its functions
(Solved)
Define windows firewall and explain its functions
Date posted:
April 24, 2018
.
Answers (1)
-
1.(i) Define WIMP
(ii) Explain the elements of WIMP (windows, icons, menus, pointer)
(Solved)
1.(i) Define WIMP
(ii) Explain the elements of WIMP (windows, icons, menus, pointer)
Date posted:
April 24, 2018
.
Answers (1)
-
Define (i)operating system (ii)windowing
(Solved)
Define
i)operating system
ii)windowing
Date posted:
April 24, 2018
.
Answers (1)
-
Differentiate between physical design and conceptual design
(Solved)
Differentiate between physical design and conceptual design
Date posted:
April 24, 2018
.
Answers (1)
-
State the advantages and disadvantages menu Selection Interaction Style
(Solved)
State the advantages and disadvantages menu Selection Interaction Style
Date posted:
April 24, 2018
.
Answers (1)
-
State the financial benefits of improved user interface to an organization
(Solved)
State the financial benefits of improved user interface to an organization.
Date posted:
April 24, 2018
.
Answers (1)