نتایج جستجو برای: forensics
تعداد نتایج: 3917 فیلتر نتایج به سال:
In March 2012, Mainland China has amended its Criminal Procedure Law, which includes the introduction of a new type of evidence, i.e., digital evidence, to the court of law. To better understand the development of computer forensics and digital evidence in Mainland China, this paper discusses the Chinese legal system in relation to digital investigation and how the current legal requirements af...
In WISE 4, Armstrong [1] presented a multidisciplinary view in computer forensics education. The view was primarily focusing solely on the education of computer forensics students, which was indeed along the lines of multidisciplinarity. However, this view does not involve integration between the different disciplines. In this paper, the scope of the approach is extended in order to allow a two...
.............................................................................................................................. ii Table of
KEYWORDS Security policy; Forensic policy; IT management; Forensic readiness; Statistics Computer security is of concern to those in IT (Information Technology) and forensic readiness (being prepared to deal effectively with events that may require forensic investigation) is a growing issue. Data held only on magnetic or other transient media require expert knowledge and special procedures to p...
The field of cyber forensics, still in its infancy, possesses a strong need for direction and definition. Areas of specialty within a professional environment, certifications, and/or curriculum development are still questioned. With the continued need to standardize parts of the field, methodologies need to be created that will allow for uniformity and direction. This paper focuses on creating ...
Th is essay discusses some of the principal challenges facing the emerging discipline of digital forensics. Most of the challenges have a scientific basis-understanding the needs and limitations caused by changes in the scope and pace of information technology. Others are engineering in nature, requiring the construction of new software and hardware to enable the collection, retention and exami...
It could be argued that the academic perspective of computer forensic practitioner requirements reflecting the thinking world (and is based on scientific methods) does not accurately reflect those requirements considered important by some people universities would desire as students, the computer forensic practitioners. This paper presents an analysis of data collected from full time practition...
Forensically sound” is a term used extensively in the digital forensics community to qualify and, in some cases, to justify the use of a particular forensic technology or methodology. Indeed, many practitioners use the term when describing the capabilities of a particular piece of software or when describing a particular forensic analysis approach. Such a wide application of the term can only l...
Computer forensics is the discipline that deals with the acquisition, investigation, preservation, and presentation of digital evidence in the court of law. Whereas antiforensics is the terminology used to describe malicious activities deployed to delete, alter, or hide digital evidence with the main objective of manipulating, destroying, and preventing the creation of evidence. Various antifor...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید