Access over 35 million academic & study documents

Digital Forensics System Logs Browser History And Timelines Discussion

Content type
User Generated
Subject
Computer Science
School
University of Maryland University College
Type
Homework
Showing Page:
1/4
Running head: DIGITAL FORENSICS SYSTEM LOGS, BROWSER HISTORY, AND
TIMELINES DISCUSSION 1
Digital forensics System Logs, Browser History, and Timelines Discussion
Name
Institution

Sign up to view the full document!

lock_open Sign Up
Showing Page:
2/4
DIGITAL FORENSICS SYSTEM LOGS, BROWSER HISTORY, AND TIMELINES
DISCUSSION 2
Digital forensics System Logs, Browser History, and Timelines Discussion
1. What is a system log, and how can this be important to a computer forensics
examination? For example, what is the Event Viewer? What is an Internet Information
System (IIS) log?
The growing dependence in technology has provided a platform in which computing
devices are used to commit crimes. With such, it has given rise to forensic examination.
Whenever a forensic examiner wants to conduct a forensic analysis, system logs become very
handy. System logs are records found in an operating system that contains a list of events and
system processes, including the drivers that were loaded to the system (Choudhary & Sharma,
2017). These details include data which are informational, errors and warnings that were
experienced or processed in the system. Any operating system usually maintains these events for
monitoring, administering and the troubleshooting of the system. However, not all individuals
use computers for this purpose only because in some cases, they can be used to commit the
crime. Therefore, these logs become crucial in forensic examination because the records can be
analysed and used in court to judge the suspect.
Some tools can be used to achieve this, for instance, the use of an Event Viewer. This
application displays system messages and the logs of various application which include errors,
warnings and informational data (Choudhary & Sharma, 2017). Initially, it was meant to
troubleshoot operating system errors but can be useful during forensic examination. Some
individuals have used this tool to scam others that probably their systems have encountered
errors especially if one is not familiar with Event Viewer and accepting to receive technical
support.

Sign up to view the full document!

lock_open Sign Up
Showing Page:
3/4

Sign up to view the full document!

lock_open Sign Up
End of Preview - Want to read all 4 pages?
Access Now
Unformatted Attachment Preview
Running head: DIGITAL FORENSICS SYSTEM LOGS, BROWSER HISTORY, AND TIMELINES DISCUSSION 1 Digital forensics System Logs, Browser History, and Timelines Discussion Name Institution DIGITAL FORENSICS SYSTEM LOGS, BROWSER HISTORY, AND TIMELINES DISCUSSION 2 Digital forensics System Logs, Browser History, and Timelines Discussion 1. What is a system log, and how can this be important to a computer forensics examination? For example, what is the Event Viewer? What is an Internet Information System (IIS) log? The growing dependence in technology has provided a platform in which computing devices are used to commit crimes. With such, it has given rise to forensic examination. Whenever a forensic examiner wants to conduct a forensic analysis, system logs become very handy. System logs are records found in an operating system that contains a list of events and system processes, including the drivers that were loaded to the system (Choudhary & Sharma, 2017). These details include data which are informational, errors and warnings that were experienced or processed in the system. Any operating system usually maintains these events for monitoring, administering and the troubleshooting of ...
Purchase document to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Studypool
4.7
Indeed
4.5
Sitejabber
4.4

Similar Documents