On-Site Investigation Electronic Evidence

Article Preview

Abstract:

In the era of computer networks, digital, network, information, with the rapid development of high technology has also brought many problems. Widespread use of network, the network increasing proportion of the population, and uneven quality of the network, network become a new type of criminal tools, criminal place. Crime prevention network, has become the computer field, the legal profession must face one of the topics. And how to resist the various modus operandi, how to do in the case of the detection process did not miss any clues, it became a breakthrough in fight against computer crime areas. This paper[1] firstly outlines the theory of electronic evidence, feature analysis, which describes computer crime / network crime cases in the exploration of electronic evidence collection, extraction and analysis. [1] This work is partially supported by the Opening Project of Key Lab of Information Networks Security of Ministry of Public Security(C09608)

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 268-270)

Pages:

1792-1796

Citation:

Online since:

July 2011

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2011 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Guide to computer forensics and investigation (second edition), edited by Bill Nelson, Amelia Phillips, Frank Enfinger.

Google Scholar

[2] Computer network information security theory, edited by Jiangjianchun, Yangfan, Xi'an University of electronic science and technology press.

Google Scholar

[3] Computer Forensics, edited by Chenlong, Maiyonghao, Wuhan university press.

Google Scholar

[4] Forensic Examination of Digital Evidence: A Guide for Law Enforcement, U.S. Department of Justice, (1994).

Google Scholar

[5] What is computer forensics; Principles of computer forensics; Linux dd basics; http: /www. forensicfocus. com/what-is-computer-forensics.

Google Scholar

[6] Forensic Analysis of the Windows Registry, edited by Lih Wern Wong School of Computer and Information Science, Edith Cowan University.

Google Scholar

[7] Windows Forensic Analysis, edited by Carvey, Harlan. Rockland, MA: Syngress, (2007).

Google Scholar

[8] Interview with Graham Brown-Martin, Digital Safety Conference (June 19th 2009) - 12/06/09. http: /www. forensicfocus. com/graham-brown-martin-interview-120609.

Google Scholar

[9] Exploring the computer crime and investigation of evidence, reported by Xuqimin, ORACLE Software Systems Ltd. http: /www. zfwlxt. com/html/2008-3/2008325850191. htm.

Google Scholar