What is Forensic Computing?

نویسنده

  • Rodney McKemmish
چکیده

Adam Graycar Director Developments in information technology have begun to pose new challenges for policing. Most professions have had to adapt to the digital age, and the police profession must be particularly adaptive, because criminal exploitation of digital technologies necessitates new types of criminal investigation. More and more, information technology is becoming the instrument of criminal activity. Investigating these sophisticated crimes, and assembling the necessary evidence for presentation in a court of law, will become a significant police responsibility. This paper provides an overview of the new law enforcement field of forensic computing. It is an abridged version of a report prepared by the author during his Donald Mackay Churchill Fellowship. Its publication here reflects the Australian Institute of Criminology’s continuing role in informing policy makers and the public about complex criminal activity.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

To Revisit: What is Forensic Computing?

The increase in incidence of criminal, illegal and inappropriate computer behaviour has resulted in organisations forming specialist teams to investigate these behaviours. Academia has also responded by endeavouring to research critical aspects and to support organisations mounting these types of investigations. As a result an infant discipline has developed in which researchers and practitione...

متن کامل

On the role of file system metadata in digital forensics

Most of the effort in today’s digital forensics community lies in the retrieval and analysis of existing information from computing systems. Little is being done to increase the quantity and quality of the forensic information on today’s computing systems. In this paper we pose the question of what kind of information is desired on a system by a forensic investigator. We give an overview of the...

متن کامل

Structured investigation of digital incidents in complex computing environments

Critics, unimpressed by the rigor of the forensic digital examination process, have taken the position that forensic digital analysis is, more rightly, simply little more than ad hoc data collection and analysis. The reality is that forensic digital analysis as a whole, in its relative infancy, is the unwilling victim of the rapid advancement of computer technology. Struggling to keep pace with...

متن کامل

Scenario-Based Digital Forensics Challenges in Cloud Computing

The aim of digital forensics is to extract information to answer the 5Ws (Why, When, Where, What, and Who) from the data extracted from the evidence. In order to achieve this, most digital forensic processes assume absolute control of digital evidence. However, in a cloud environment forensic investigation, this is not always possible. Additionally, the unique characteristics of cloud computing...

متن کامل

Identifying Evidence for Implementing a Cloud Forensic Analysis Framework

Cloud computing provides several benefits to organizations such as increased flexibility, scalability and reduced cost. However, it provides several challenges for digital forensics and criminal investigation. Some of these challenges are the dependence of forensically valuable data on the deployment model, multiple virtual machines running on a single physical machine and multiple tenancies of...

متن کامل

The Pre-images of Bitwise AND Functions in Forensic Analysis

Mechanisms now exist that detect tampering of a database, through the use of cryptographically-strong hash functions, as well as algorithms for forensic analysis of such tampering, thereby determining who, when, and what. This paper shows that for one such forensic analysis algorithm, the tiled bitmap algorithm, determining when and what, which goes far in determining who, has at its core compu...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1999