Skip to content

Ops 401: Class 34

Nicholas Loiacono edited this page Jun 1, 2023 · 1 revision

This topic matters as it relates to what I'm studying in this module because it teaches how to react when a cyber incident occurs, how to analyze it, and how to recover lost data, which complements the preventative aspects of cybersecurity. It's also vital for understanding legal and ethical issues related to cybersecurity.

  • Computer forensics and cybersecurity differ mainly in their approach to securing digital environments. Cybersecurity focuses on preventing cyber threats, aiming to keep hackers out and protect information. On the other hand, computer forensics is more reactionary, focusing on analyzing breaches or hacks that have already happened, learning from them, and recovering data.

  • A computer forensics examination has six stages. Readiness is preparation for any investigation, ensuring appropriate training and equipment. Evaluation assigns roles and resources and identifies investigation risks. Collection involves gathering evidence and relevant data from devices. Analysis examines this evidence for valuable information about the incident. Presentation shares findings and offers security improvement strategies. Finally, Review evaluates the investigation process for future improvements.

Things I want to know more about are the ethical implications of computer forensics, the evolving challenges posed by emerging technologies, and the specifics of how different computer forensics tools are used in various scenarios.

References

WGU. (2020, April 17). What is computer forensics?. Western Governors University. Computer Forensics

Clone this wiki locally