<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <title>Repositório Colecção:</title>
  <link rel="alternate" href="http://repositorio.unirn.edu.br/jspui/handle/123456789/730" />
  <subtitle />
  <id>http://repositorio.unirn.edu.br/jspui/handle/123456789/730</id>
  <updated>2026-04-28T05:48:14Z</updated>
  <dc:date>2026-04-28T05:48:14Z</dc:date>
  <entry>
    <title>Computação forense e suas ferramentas de investigação criminal</title>
    <link rel="alternate" href="http://repositorio.unirn.edu.br/jspui/handle/123456789/731" />
    <author>
      <name />
    </author>
    <id>http://repositorio.unirn.edu.br/jspui/handle/123456789/731</id>
    <updated>2023-11-27T16:39:30Z</updated>
    <published>2020-01-01T00:00:00Z</published>
    <summary type="text">Título: Computação forense e suas ferramentas de investigação criminal
Resumo: In this article we will talk about forensic computing, what it is, what are its tools &#xD;
and its methods that are used in computer experts. In thesis, forensic &#xD;
computing is the science that comprises the acquisition, prevention, recovery &#xD;
and analysis of computational evidence, data that have been electronically &#xD;
processed and stored in files. This article was based on the study of forensic &#xD;
computing. To acquire the necessary knowledge to elaborate the project, the &#xD;
subjects about forensic computation, its legal implications, how to acquire, &#xD;
preserve, analyze and present the data of an investigation were studied. About &#xD;
the analysis of evidence of a cyber-crime, its concepts, characteristics, &#xD;
mechanisms, security policies and forms of protection. In each step, it was &#xD;
described in detail and presented through flowcharts for better understanding. &#xD;
At the end of this article we will be able to give you a certain notion of the &#xD;
important role of this subject in the technologically developed society. We will &#xD;
know the real value of the subject, since every day the human being is strongly &#xD;
linked to technology, which besides bringing several benefits, such as &#xD;
connection, automation among others, also brings the bad side of becoming a &#xD;
target of virtual crimes.
Type: Trabalho de Conclusão de Curso</summary>
    <dc:date>2020-01-01T00:00:00Z</dc:date>
  </entry>
</feed>

