A Survey of the Procedure for Computer Forensics

碩士 === 嶺東科技大學 === 資訊科技應用研究所 === 96 === With the emergence of information technology and the advent of the computer age, the use of computers, as well as the issue of Internet crime, including fraud, is one of the most significant challenges that the law enforcement agencies have ever faced; the diff...

Full description

Bibliographic Details
Main Authors: Wen-Kang Liu, 劉文港
Other Authors: Hui-Wen Liao
Format: Others
Language:zh-TW
Published: 2008
Online Access:http://ndltd.ncl.edu.tw/handle/27804807895771939096
id ndltd-TW-096LTC00396008
record_format oai_dc
spelling ndltd-TW-096LTC003960082016-05-16T04:10:16Z http://ndltd.ncl.edu.tw/handle/27804807895771939096 A Survey of the Procedure for Computer Forensics 電腦鑑識程序之研究 Wen-Kang Liu 劉文港 碩士 嶺東科技大學 資訊科技應用研究所 96 With the emergence of information technology and the advent of the computer age, the use of computers, as well as the issue of Internet crime, including fraud, is one of the most significant challenges that the law enforcement agencies have ever faced; the difficulties in detecting some criminal behavior, significant under-reporting (particularly by big business) and the lack of any meaningful statistics on the nature and incidence of electronic crime leads to the urgent need for the computer forensic tools to collect effective digital evidence; At present time, forensic divisions often use the Linux Live CD forensic integrated tools to handle the cases where they are unable to boot up the computer to gather forensic evidences; however, current computer operating system is mostly Window XP; thus, this paper will use XP Live CD integrated computer forensic tools to study computer forensic procedures; The process will build an experimental environment, then use computer crime cases to collect relevant evidences, and explore solutions. Usually a single forensic tool presents insufficient evidence, but when more forensic tools are used, the relevant crux can obtained during in the processes and presented in the forensic final report; I believe it will allow officers, who are investigating digital crimes/frauds, capture more complete evidences, and thus improve the chance at the court. Hui-Wen Liao 廖惠雯 2008 學位論文 ; thesis 75 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 嶺東科技大學 === 資訊科技應用研究所 === 96 === With the emergence of information technology and the advent of the computer age, the use of computers, as well as the issue of Internet crime, including fraud, is one of the most significant challenges that the law enforcement agencies have ever faced; the difficulties in detecting some criminal behavior, significant under-reporting (particularly by big business) and the lack of any meaningful statistics on the nature and incidence of electronic crime leads to the urgent need for the computer forensic tools to collect effective digital evidence; At present time, forensic divisions often use the Linux Live CD forensic integrated tools to handle the cases where they are unable to boot up the computer to gather forensic evidences; however, current computer operating system is mostly Window XP; thus, this paper will use XP Live CD integrated computer forensic tools to study computer forensic procedures; The process will build an experimental environment, then use computer crime cases to collect relevant evidences, and explore solutions. Usually a single forensic tool presents insufficient evidence, but when more forensic tools are used, the relevant crux can obtained during in the processes and presented in the forensic final report; I believe it will allow officers, who are investigating digital crimes/frauds, capture more complete evidences, and thus improve the chance at the court.
author2 Hui-Wen Liao
author_facet Hui-Wen Liao
Wen-Kang Liu
劉文港
author Wen-Kang Liu
劉文港
spellingShingle Wen-Kang Liu
劉文港
A Survey of the Procedure for Computer Forensics
author_sort Wen-Kang Liu
title A Survey of the Procedure for Computer Forensics
title_short A Survey of the Procedure for Computer Forensics
title_full A Survey of the Procedure for Computer Forensics
title_fullStr A Survey of the Procedure for Computer Forensics
title_full_unstemmed A Survey of the Procedure for Computer Forensics
title_sort survey of the procedure for computer forensics
publishDate 2008
url http://ndltd.ncl.edu.tw/handle/27804807895771939096
work_keys_str_mv AT wenkangliu asurveyoftheprocedureforcomputerforensics
AT liúwéngǎng asurveyoftheprocedureforcomputerforensics
AT wenkangliu diànnǎojiànshíchéngxùzhīyánjiū
AT liúwéngǎng diànnǎojiànshíchéngxùzhīyánjiū
AT wenkangliu surveyoftheprocedureforcomputerforensics
AT liúwéngǎng surveyoftheprocedureforcomputerforensics
_version_ 1718268829085204480