04-09-2014, 02:14 PM
Penetration testing is fast growing field. The technology is advancing faster than some cyber laws can keep up with. Probable cause, search warrants, and focus of search when dealing with computers, software, and Web content have been compared to traditional searches. Since computers contain so much information, it is possible to uncover incriminating information that cannot be used due to the limited search warrant. The motivation behind the search and seizure laws will be examined in relation to the computer forensic field. The timely processing of a computer and software must be taken into account. If not collected properly, all related evidence can be irrevocably lost. A specific list of steps is necessary for computer searches. Heat, cold, magnetic exposure, mishandling causing breakage, improper labeling and other issues can arise when collecting computer evidence. Just like any other crime scene, penetration testing is the site of a crime. In fact, penetration testing will become more and more frequent as technology progresses. Vulnerabilities and patching is a necessary fie