Jump to ContentJump to Main Navigation
Advances in Cyber SecurityTechnology, Operations, and Experiences$
Users without a subscription are not able to see the full content.

D. Frank Hsu and Dorothy Marinucci

Print publication date: 2013

Print ISBN-13: 9780823244560

Published to Fordham Scholarship Online: September 2015

DOI: 10.5422/fordham/9780823244560.001.0001

Show Summary Details
Page of

PRINTED FROM FORDHAM SCHOLARSHIP ONLINE (www.fordham.universitypressscholarship.com). (c) Copyright Fordham University Press, 2021. All Rights Reserved. An individual user may print out a PDF of a single chapter of a monograph in FSO for personal use.date: 22 September 2021

Computer Forensics from a Law Enforcement Perspective

Computer Forensics from a Law Enforcement Perspective

(p.188) Computer Forensics from a Law Enforcement Perspective
Advances in Cyber Security

Kevin Kelly

Fordham University Press

This chapter begins by discussing the incorporation of security into a business plan. It describes evidence-gathering in both public and private investigations of a cyber event, and emphasizes the fact that successful investigations depend on the employee not having an expectation of privacy in the workplace. The chapter goes on to explain the role of computer forensics in criminal investigations, including preserving evidence, finding deleted information, cracking passwords, locating fragments of a file, and automating searches. It then discusses protection from cyber adversities, arguing that is not only the government's responsibility to protect public resources, especially cyberspace resources; private enterprises and end users must also take the necessary precautions to secure their systems.

Keywords:   computer forensics, cyber security, public investigation, private investigation, employee privacy, cyer attacks

Fordham Scholarship Online requires a subscription or purchase to access the full text of books within the service. Public users can however freely search the site and view the abstracts and keywords for each book and chapter.

Please, subscribe or login to access full text content.

If you think you should have access to this title, please contact your librarian.

To troubleshoot, please check our FAQs , and if you can't find the answer there, please contact us .