深藍 發問時間: 社會與文化語言 · 1 0 年前

請英文達人幫忙翻譯文章-07

’’Similar analysis techniques can be applied to email. Even though fraudsters rarely talk explicitly about their crimes in email conversations, it does happen, explains Inforenz’s Clark. And the ability to collate, filter and search across archived email can help to highlight someone within an investigation, especially when cross referenced against other documentary evidence.Ideally, a forensic accountant will be able to analyse communications such as these by gathering email from a corporate server. In certain regulated industries archiving email is mandatory, making it easy to gather copies from a central location even when an employee has attempted to delete the mail locally.There are some things that fraudulent employees can do to hide their tracks and make things more difficult for computer forensics experts. Physically overwriting deleted evidence on disk can make it difficult to retrieve. Using tools like Cyberscrub’s Privacy Suite, for example, it becomes possible to overwrite data several times using different patterns in a bid to destroy the residual magnetism from the original data.‘‘It stops you in your tracks. The magnetic areal density now is so high and the encoding on the disk is complex enough that trying to read something that has been overwritten a number of times is very difficult,’’ laments Dearsley.Similarly, encryption can be a major hurdle for forensics experts. Encrypted files may be cracked with brute force attacks if inadequate passwords are used, or if the encryption system itself is flawed and stores passwords as plain text.But a well-implemented strong encryption system can render a file inaccessible without the relevant key.

2 個解答

評分
  • 最佳解答

    ' ' 相似的分析技術可能嚮電子郵件被申請。即使fraudsters 明確地很少談話關於他們的罪行在電子郵件交談, 它發生, 解釋Inforenz 的克拉克。並且能力校對, 過濾和查尋橫跨被歸檔的電子郵件可能幫助突出某人在調查之內, 特別是何時十字架參考反對其它新聞紀錄片的evidence.Ideally, 一名法庭會計能分析通信譬如這些由會集電子郵件從一臺公司伺服器。在某些被調控的產業歸檔電子郵件是委託人, 使它容易會集拷貝從一個中央地點既使當雇員試圖刪除郵件locally.There 是一些事欺騙雇員能做掩藏他們的軌道和使事困難為電腦辯論術專家。完全重寫被刪除的證據在盤可能使它難檢索。使用工具喜歡Cyberscrub 的保密性隨員, 例如, 它變得可能重寫資料多次使用不同的樣式為了目的毀壞殘餘的磁性從原始的資料它停止您在您的軌道。磁性地區密度現在是因此上流和內碼在盤是足夠複雜的設法讀某事重寫一定數量的次是非常困難的, "哀嘆Dearsley.Similarly, 編成密碼可能是一個主要障礙為辯論術專家。被編成密碼的文件也許崩裂以強力攻擊如果不充分的密碼被使用, 或如果編成密碼系統是有缺陷的和商店密碼如同text.But 一個很好被實施的強的編成密碼系統可能簡單使文件不能進入沒有相關的鑰匙。

  • 1 0 年前

    ’'相似的分析技術能被申請寄。 即使 fraudsters 很少地明確地談論電子郵件交談的他們的犯罪,它確實發生, Inforenz 的克拉克解釋。 而且能力橫過對照,過濾而且搜尋檔案電子郵件能幫助在調查裡面強調某人,尤其當交叉的參考反對其他的文件 evidence.Ideally,一個討論的會計員將能夠藉由收集來自企業的 se 的電子郵件分析像如此的溝通

    參考資料: 線上
還有問題?馬上發問,尋求解答。