Saturday, December 7, 2019

VPN and Cryptography Tutorial

Question: Discuss about the VPN and Cryptography Tutorial. Answer: Introduction: The digital forensic is quite an old field which has taken up the rise in the near future itself, in the early 1900, the digital investigation was not so organized and no standard procedures were laid down, it was in the 21st century that standard procedures came and all the standard procedures were laid down. The Digital forensic is not limited to data recovery and collection but also includes data validation, data authorization and it verification. The proper guidelines made it possible to provide the best in class forensics and that the proof foolproof and can be presented as digital evidence in the court of law. With the increase of digital technology in the world, there is an increase in number of cybercrimes around the world. These evidences should be fool proof as it is the matter of life and death when the crimes are to be proved. In order to recover the different types of files like MS Word, MS Excel, MS ppt or database files that can be done using the Recovery Software. The recovery can be done and data should be verified using the SHA-1, because if the data is tampered to manage the data and verify it these hash values comes quite handy in order to verify the data. Hash calculations are very important and as important as recovery and proof management. The data recovery is dependent upon: These factors could be a hindrance for recovery and data collection, using some of the advance tools and techniques for data and finding the criminal. The recovered data is then stored on the external sources like HDD or cloud and respective hashes are also saved. The hashing helps in verifying the data and manage the resources and techniques efficiently. References MD5 and Sha 1 algorithm - VPN and cryptography Tutorial. (2017). Internet-computer-security.com. Retrieved 5 April 2017, from https://www.internet-computer-security.com/VPN-Guide/Sha-1.html What Are MD5, SHA-1, and SHA-256 Hashes, and How Do I Check Them?. (2017). Howtogeek.com. Retrieved 5 April 2017, from https://www.howtogeek.com/67241/htg-explains-what-are-md5-sha-1-hashes-and-how-do-i-check-them/

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.