For all the brave souls that give of themselves today, have paid the ultimate price in protection and defense of others, and for the innocent victims of cowardly acts by evildoers, our deepest, and heartfelt honors and thanks. America will prevail, and never forget the sacrifices you've made!
Semper Vigilanis Sui Generis
What This Site and Cyber Forensics Are All About
Cyber forensics can be defined as the process of extracting information and data from computer storage media and guaranteeing its accuracy and reliability. The challenge of course is actually finding this data, collecting it, preserving it, and presenting it in a manner acceptable in a court of law.
Electronic evidence is fragile and can easily be modified. Additionally, cyber thieves, criminals, dishonest and even honest employees hide, wipe, disguise, cloak, encrypt and destroy evidence from storage media using a variety of freeware, shareware and commercially available utility programs.
A global dependency on technology combined with the expanding presence of the Internet as a key and strategic resource requires that corporate assets are well protected and safeguarded.
When those assets come under attack, or are misused, infosecurity professionals must be able to gather electronic evidence of such misuse and utilize that evidence to bring to justice those who misuse the technology.
Cyber forensics, while firmly established as both an art as well as a science, is at its infancy. With technology evolving, mutating, and changing at such a rapid pace, the rules governing the application of cyber forensics to the fields of auditing, security, and law enforcement are changing as well. Almost daily, new techniques and procedures, are designed to provide infosecurity professionals a better means of finding electronic evidence, collecting it, preserving it, and presenting it to client management for potential use in the prosecution of cyber criminals.
The anonymity provide by the Internet, and the ability for society’s criminal element, to use information technology as a tool for social and financial discourse, mandates that those professionals charged with the responsibility of protecting critical infrastructure resources, have the tools to do so. The authors of this site have developed a text that will provides one of those tools.
This website is designed to inform and act as a forum for you, a mechanism for feedback with us, and to keep you, the general public, abreast on what we are all about and information on the text that is being prepared.
This site will be changing regularly, so come back often. We hope you enjoy your visit here, and find the information provided useful.
Importance of Computer Forensics
"There are many people of poor and evil motivation who are seeking to disrupt business and government and exploit any vulnerabilities in the digital universe."
John Ashcroft, U.S. Attorney General, 2001
This page has been viewed times.
This site is Copyright © 2000-2006 By Albert J. Marcella and Robert S. Greenfield. All rights under copyright reserved. All corporate logos used herein are copyright of their respective companies and may not be duplicated in any manner from this website. Use of such logos herein are in accordance with each companies standards and usage guidelines and are used with permission granted either specifically, or by published policy of those companies.
Site contact: Use the Site Feedback Page to contact the Webmaster