Forensic Computing

نویسندگان

  • Vlasti Broucek
  • Paul Turner
چکیده

Forensic computing (FC) is an emerging academic discipline that is difficult to define. This paper attempts to define taxonomy and interrelationships between specific academic and scientific disciplines involved. First, it provides a review of recent forensic computing literature and presents a taxonomy of the emerging field based on the contributions of authors from a number of disciplines including computer security, computer law and information systems management. Second, this paper conducts a preliminary exploration of the interrelationships between a number of specific issues that converge on some of the central themes of forensic computing as identified by McKemmish (1999): identification, preservation, analysis and presentation of computer evidence. Four specific issues are examined: the sophistication of technical security measures versus the need for evidence acquisition, a key distinction between computer security and forensic computing, the management strategies and 2 Vlasti Broucek, Paul Turner issues involved in FC and last but not least the political dimensions of forensic

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Procedures for a Harmonised Digital Forensic Process in Live Forensics

Cloud computing is a novel computing paradigm that presents new research opportunities in the field of digital forensics. Cloud computing is based on the following principles: on-demand self-service, broad network access, resource pooling, rapid elasticity and measured service. These principles require that cloud computing be distributed internationally. Even if the cloud is hosted locally, it ...

متن کامل

An integrated conceptual digital forensic framework for cloud computing

Increasing interest in and use of cloud computing services presents both opportunities for criminal exploitation and challenges for law enforcement agencies (LEAs). For example, it is becoming easier for criminals to store incriminating files in the cloud computing environment but it may be extremely difficult for LEAs to seize these files as the latter could potentially be stored overseas. Two...

متن کامل

Forensic Computing in the Workplace: Hegemony, Ideology, and the Perfect Panopticon?

Forensic computing is an emerging academic discipline and professional field. Most publications in the area concentrate on technical issues related to the provision of digital evidence that can stand up to scrutiny in a court of law. There is a generally shared assumption that forensic computing activities are legitimate and in the best interests of society. This article aims to shed doubt on t...

متن کامل

A Unified Forensic Framework for Data Identification and Collection in Mobile Cloud Social Network Applications

Mobile Cloud Computing (MCC) is the emerging and well accepted concept that significantly removes the constraints of mobile devices in terms of storage and computing capabilities and improves productivity, enhances performance, saves energy, and elevates user experience. The consolidation of cloud computing, wireless communication infrastructure, portable computing devices, locationbased servic...

متن کامل

Digital Forensic Framework for a Cloud Environment

The advent of cloud computing provides good opportunities for both good and malicious use. Cloud computing is at its infancy stage and its security is still an open research issue. Malicious users take advantage of the current lack of advanced security mechanisms in the cloud. Cloud computing paradigm enables users to access computing resources without necessarily owning physical infrastructure...

متن کامل

Cloud Computing Log Evidence Forensic Examination Analysis

Forensic analysis in the context of physical evidence is a relatively mature field. The computerization of society has led to the emergence of digital forensics and now the popularity of cloud computing has sparked interest into cloud forensics. Our goal in this paper is to enable cloud forensics, by using the theory of abstraction layers to describe the purpose and goals of virtual machine (VM...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2001