An Introduction to Computer Forensics

Forensic auditing deals with an extensive range of analytical work that is performed by expert accountants. This line of work typically involves an examination of the financial affairs of a company and is frequently connected with scrutinizing fraudulent activity. Forensic auditing consists of the entire investigation process, including having the investigator serve as an expert witness in a trial. Forensic accountants are even qualified to look into situations that are not fraud-related. These might include the settling of fiscal issues of a business or disputes between insurance claims.

The forensic investigation encompasses the necessary steps taken to collect evidence in a suspected fraud case.… Read the rest

Distributed Data Processing (DDP)

Distributed database system technology is the union of what appear to be two diametrically opposed approaches to data processing: database system and computer network technologies. Database system have taken us from a paradigm of data processing in which each application defined and maintained its own data to one in which the data is defined and administered centrally. This new orientation results in data independence , whereby the application programs are immune to changes in the logical or physical organization of the data. One of the major motivations behind the use of database systems is the desire to integration the operation data of an enterprise and to provide centralized, thus controlled access to that data.… Read the rest

What is Dumpster Diving?

In the world of information technology, dumpster diving is a technique which is used to retrieve information that could be used to carry out a fraudulent activity. Many people throw away their sensitive documents that contain their personal information without destroying them properly that a fraudster can find in trash cans and as a result use this information to commit a fraud. Dumpster diving is not too meant to probing through the trash for noticeable resources like identity numbers or passwords written down on papers. Apparently useless information like a phone list, calendar, or organizational chart can be used to obtain valuable information.… Read the rest

Ethical Hackers and Ethical Hacking

An ethical hacker is a security professional who helps organization to take defensive measures against malicious attacks and usually the process he doing to find those vulnerable point is called Ethical Hacking. Sometimes this is also known as Penetration Testing or Intuition Testing. In this case, the ethical hackers are getting into the minds of computer criminals; think like them to find about innovative ways the hackers may use to get into the systems. Then organizations can take required actions to avoid those vulnerabilities.

It has identified that the almost all computer systems have vulnerabilities that can be exploited by a hacker to come to do damages.… Read the rest

What is Expert System?

An expert system is an advanced computer application that is implemented for the purpose of providing solutions to complex problems, or to clarify uncertainties through the use of non-algorithmic programs where normally human expertise will be needed. Expert systems are most common in complex problem domain and are considered as widely used alternatives in searching for solutions that requires the existence of specific human expertise. The expert system is also able to justify its provided solutions based on the knowledge and data from past users. Normally expert systems are used in making business marketing strategic decisions, analyzing the performance of real time systems, configuring computers and perform many other functions which normally would require the existence of human expertise.… Read the rest

An Introduction to E-Services

E-services are important in B2C e-commerce for managing customer relations and enhancing sales. Rapidly advancement of technology such as wireless, broadband, smart cards, data warehousing, data mining and agent technologies, are contribute toward the effective accessibility and servicing of the correctly targeted customers for business while providing more choices, options and ultimately power to customers in their transactions with business. Further e-service provides a new business paradigm for the organizations operating in the electronic environment.

There are three primary reasons for firms to develop e-services. Firstly, margin, consumer acquisition and service costs are generally much lower in an online medium versus that in an offline medium.… Read the rest