A Survey of the Procedure for Computer Forensics

碩士 === 嶺東科技大學 === 資訊科技應用研究所 === 96 === With the emergence of information technology and the advent of the computer age, the use of computers, as well as the issue of Internet crime, including fraud, is one of the most significant challenges that the law enforcement agencies have ever faced; the diff...

Full description

Bibliographic Details
Main Authors: Wen-Kang Liu, 劉文港
Other Authors: Hui-Wen Liao
Format: Others
Language:zh-TW
Published: 2008
Online Access:http://ndltd.ncl.edu.tw/handle/27804807895771939096
Description
Summary:碩士 === 嶺東科技大學 === 資訊科技應用研究所 === 96 === With the emergence of information technology and the advent of the computer age, the use of computers, as well as the issue of Internet crime, including fraud, is one of the most significant challenges that the law enforcement agencies have ever faced; the difficulties in detecting some criminal behavior, significant under-reporting (particularly by big business) and the lack of any meaningful statistics on the nature and incidence of electronic crime leads to the urgent need for the computer forensic tools to collect effective digital evidence; At present time, forensic divisions often use the Linux Live CD forensic integrated tools to handle the cases where they are unable to boot up the computer to gather forensic evidences; however, current computer operating system is mostly Window XP; thus, this paper will use XP Live CD integrated computer forensic tools to study computer forensic procedures; The process will build an experimental environment, then use computer crime cases to collect relevant evidences, and explore solutions. Usually a single forensic tool presents insufficient evidence, but when more forensic tools are used, the relevant crux can obtained during in the processes and presented in the forensic final report; I believe it will allow officers, who are investigating digital crimes/frauds, capture more complete evidences, and thus improve the chance at the court.