Summary of Introduction to Computer Forensics
2025, April 09
The science of collecting, preserving, analyzing, and presenting digital evidence from devices like computers, USBs, phones.
Used in:
3 Main Security Teams in Companies:
Team | Purpose |
---|---|
1. Vulnerability Assessment | Test systems for security holes |
2. Network Intrusion Response | Detect attacks and respond |
3. Computer Investigations | Analyze evidence after an incident |
✅ All aim for: Identify → Collect → Analyze → Present
Type | Who Handles? | Example |
---|---|---|
Public | Govt. (Police, Court) | Hacker stealing money from a bank |
Private | Companies/Organizations | Employee misusing office email for harassment |
You are the computer detective:
You must: