Summary of Introduction to Computer Forensics
2025, April 09
The science of collecting, preserving, analyzing, and presenting digital evidence from devices like computers, USBs, phones.
Used in:
3 Main Security Teams in Companies:
| Team | Purpose |
|---|---|
| 1. Vulnerability Assessment | Test systems for security holes |
| 2. Network Intrusion Response | Detect attacks and respond |
| 3. Computer Investigations | Analyze evidence after an incident |
✅ All aim for: Identify → Collect → Analyze → Present
| Type | Who Handles? | Example |
|---|---|---|
| Public | Govt. (Police, Court) | Hacker stealing money from a bank |
| Private | Companies/Organizations | Employee misusing office email for harassment |
You are the computer detective:
You must: