Tuesday, April 23, 2019

E-mail and social media investigations Article Example | Topics and Well Written Essays - 250 words

E-mail and social media investigations - Article ExamplePharming involves a hacker installing a spiteful code on a private computer or ones server that later redirects to a webpage that was not expected and smishing involves the use of text messages to seduce customers (Van, 2013).The advantages of circular logging is that it helps provide recovery from any transaction failure or any pee of system crash through that may occur (Van, 2013). The logs are retained until the integrity of the current legal proceeding is ensured. The disadvantage, however, is that it is difficult to restore the database and roll it forward in case a failure occurs.When investigating an netmail abuse, one needs to detect how the server registers and handles the email upon receiving it. This is because the e-mail can either in the arrive at of a flat file or the users e-mail (Van, 2013).The information available on social media may be use in investigation, since social media acts a snitch (Van, 2013). The information can be used through scrolling through the current updates and the feeds that the site might have. This means that the sites can be used as crime detection partners through provision of evidence. Proof of integrity and validity can be accessed through finding the origin of the report and the reporters of the same (Van,

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.