A Survey of the Procedure for Computer Forensics
碩士 === 嶺東科技大學 === 資訊科技應用研究所 === 96 === With the emergence of information technology and the advent of the computer age, the use of computers, as well as the issue of Internet crime, including fraud, is one of the most significant challenges that the law enforcement agencies have ever faced; the diff...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2008
|
Online Access: | http://ndltd.ncl.edu.tw/handle/27804807895771939096 |
id |
ndltd-TW-096LTC00396008 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-096LTC003960082016-05-16T04:10:16Z http://ndltd.ncl.edu.tw/handle/27804807895771939096 A Survey of the Procedure for Computer Forensics 電腦鑑識程序之研究 Wen-Kang Liu 劉文港 碩士 嶺東科技大學 資訊科技應用研究所 96 With the emergence of information technology and the advent of the computer age, the use of computers, as well as the issue of Internet crime, including fraud, is one of the most significant challenges that the law enforcement agencies have ever faced; the difficulties in detecting some criminal behavior, significant under-reporting (particularly by big business) and the lack of any meaningful statistics on the nature and incidence of electronic crime leads to the urgent need for the computer forensic tools to collect effective digital evidence; At present time, forensic divisions often use the Linux Live CD forensic integrated tools to handle the cases where they are unable to boot up the computer to gather forensic evidences; however, current computer operating system is mostly Window XP; thus, this paper will use XP Live CD integrated computer forensic tools to study computer forensic procedures; The process will build an experimental environment, then use computer crime cases to collect relevant evidences, and explore solutions. Usually a single forensic tool presents insufficient evidence, but when more forensic tools are used, the relevant crux can obtained during in the processes and presented in the forensic final report; I believe it will allow officers, who are investigating digital crimes/frauds, capture more complete evidences, and thus improve the chance at the court. Hui-Wen Liao 廖惠雯 2008 學位論文 ; thesis 75 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 嶺東科技大學 === 資訊科技應用研究所 === 96 === With the emergence of information technology and the advent of the computer age, the use of computers, as well as the issue of Internet crime, including fraud, is one of the most significant challenges that the law enforcement agencies have ever faced; the difficulties in detecting some criminal behavior, significant under-reporting (particularly by big business) and the lack of any meaningful statistics on the nature and incidence of electronic crime leads to the urgent need for the computer forensic tools to collect effective digital evidence; At present time, forensic divisions often use the Linux Live CD forensic integrated tools to handle the cases where they are unable to boot up the computer to gather forensic evidences; however, current computer operating system is mostly Window XP; thus, this paper will use XP Live CD integrated computer forensic tools to study computer forensic procedures; The process will build an experimental environment, then use computer crime cases to collect relevant evidences, and explore solutions. Usually a single forensic tool presents insufficient evidence, but when more forensic tools are used, the relevant crux can obtained during in the processes and presented in the forensic final report; I believe it will allow officers, who are investigating digital crimes/frauds, capture more complete evidences, and thus improve the chance at the court.
|
author2 |
Hui-Wen Liao |
author_facet |
Hui-Wen Liao Wen-Kang Liu 劉文港 |
author |
Wen-Kang Liu 劉文港 |
spellingShingle |
Wen-Kang Liu 劉文港 A Survey of the Procedure for Computer Forensics |
author_sort |
Wen-Kang Liu |
title |
A Survey of the Procedure for Computer Forensics |
title_short |
A Survey of the Procedure for Computer Forensics |
title_full |
A Survey of the Procedure for Computer Forensics |
title_fullStr |
A Survey of the Procedure for Computer Forensics |
title_full_unstemmed |
A Survey of the Procedure for Computer Forensics |
title_sort |
survey of the procedure for computer forensics |
publishDate |
2008 |
url |
http://ndltd.ncl.edu.tw/handle/27804807895771939096 |
work_keys_str_mv |
AT wenkangliu asurveyoftheprocedureforcomputerforensics AT liúwéngǎng asurveyoftheprocedureforcomputerforensics AT wenkangliu diànnǎojiànshíchéngxùzhīyánjiū AT liúwéngǎng diànnǎojiànshíchéngxùzhīyánjiū AT wenkangliu surveyoftheprocedureforcomputerforensics AT liúwéngǎng surveyoftheprocedureforcomputerforensics |
_version_ |
1718268829085204480 |