Monday, September 23, 2019
E-mail and social media investigations Article Example | Topics and Well Written Essays - 250 words
E-mail and social media investigations - Article Example Pharming involves a hacker installing a spiteful code on a private computer or oneââ¬â¢s server that later redirects to a webpage that was not expected and smishing involves the use of text messages to entice customers (Van, 2013). The advantages of circular logging is that it helps provide recovery from any transaction failure or any form of system crash through that may occur (Van, 2013). The logs are retained until the integrity of the current transactions is ensured. The disadvantage, however, is that it is difficult to restore the database and roll it forward in case a failure occurs. When investigating an e-mail abuse, one needs to detect how the server registers and handles the email upon receiving it. This is because the e-mail can either in the form of a flat file or the usersââ¬â¢ e-mail (Van, 2013). The information available on social media may be used in investigation, since social media acts a snitch (Van, 2013). The information can be used through scrolling through the current updates and the feeds that the site might have. This means that the sites can be used as crime detection partners through provision of evidence. Proof of integrity and validity can be accessed through finding the origin of the report and the reporters of the same (Van,
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.