A Study of Computer Forensics Standard Operating Procedure in Military System
碩士 === 華梵大學 === 資訊管理學系碩士班 === 97 === Computer forensics is an emerging field of the information security. Many countries currently plan to develop dedicated computer crime units; training professionals and developing computer forensic hardware and software to find out key security breach evidences w...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2009
|
Online Access: | http://ndltd.ncl.edu.tw/handle/35697280996065137811 |
id |
ndltd-TW-097HCHT0396048 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-097HCHT03960482015-11-20T04:19:26Z http://ndltd.ncl.edu.tw/handle/35697280996065137811 A Study of Computer Forensics Standard Operating Procedure in Military System 國軍電腦鑑識標準作業程序之研究 Archer Yang 楊禮峰 碩士 華梵大學 資訊管理學系碩士班 97 Computer forensics is an emerging field of the information security. Many countries currently plan to develop dedicated computer crime units; training professionals and developing computer forensic hardware and software to find out key security breach evidences with high-tech computer equipment. The common goal is of these efforts is to let the Computer Forensic results, e.g., the digital evidences, be valid, convincing evidences in the court. In recent years, many cases of the military information occurred, thus our army has become aware of the importance of computer forensics. The administrative investigation these leakages is the one of major works in the future since there are wide scopes in the computer crime; the relevant laws and regulations, equipment, professional, technical manpower, forensic procedures are too much to be handled by our current forensics technology. Any mistake in the above factors will significantly affect the forensic results. This paper thus proposes a new Taiwan MND computer forensic standard operating process that is suitable for uses in our army. The security goals are achieved by using the Delphi method to revise the key critical success factors of the operating procedures in the standard international forensic formats. The Taiwan MND was proved by the over 10 experts and scholars and front-line staff with the analytic questionnaire. Based on analytic results, the Taiwan MND is a good procedure to improve our current procedures and to apply in our authorities. Huei-Chung Chu 朱惠中 2009 學位論文 ; thesis 149 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 華梵大學 === 資訊管理學系碩士班 === 97 === Computer forensics is an emerging field of the information security. Many countries currently plan to develop dedicated computer crime units; training professionals and developing computer forensic hardware and software to find out key security breach evidences with high-tech computer equipment.
The common goal is of these efforts is to let the Computer Forensic results, e.g., the digital evidences, be valid, convincing evidences in the court.
In recent years, many cases of the military information occurred, thus our army has become aware of the importance of computer forensics. The administrative investigation these leakages is the one of major works in the future since there are wide scopes in the computer crime; the relevant laws and regulations, equipment, professional, technical manpower, forensic procedures are too much to be handled by our current forensics technology. Any mistake in the above factors will significantly affect the forensic results.
This paper thus proposes a new Taiwan MND computer forensic standard operating process that is suitable for uses in our army. The security goals are achieved by using the Delphi method to revise the key critical success factors of the operating procedures in the standard international forensic formats. The Taiwan MND was proved by the over 10 experts and scholars and front-line staff with the analytic questionnaire. Based on analytic results, the Taiwan MND is a good procedure to improve our current procedures and to apply in our authorities.
|
author2 |
Huei-Chung Chu |
author_facet |
Huei-Chung Chu Archer Yang 楊禮峰 |
author |
Archer Yang 楊禮峰 |
spellingShingle |
Archer Yang 楊禮峰 A Study of Computer Forensics Standard Operating Procedure in Military System |
author_sort |
Archer Yang |
title |
A Study of Computer Forensics Standard Operating Procedure in Military System |
title_short |
A Study of Computer Forensics Standard Operating Procedure in Military System |
title_full |
A Study of Computer Forensics Standard Operating Procedure in Military System |
title_fullStr |
A Study of Computer Forensics Standard Operating Procedure in Military System |
title_full_unstemmed |
A Study of Computer Forensics Standard Operating Procedure in Military System |
title_sort |
study of computer forensics standard operating procedure in military system |
publishDate |
2009 |
url |
http://ndltd.ncl.edu.tw/handle/35697280996065137811 |
work_keys_str_mv |
AT archeryang astudyofcomputerforensicsstandardoperatingprocedureinmilitarysystem AT yánglǐfēng astudyofcomputerforensicsstandardoperatingprocedureinmilitarysystem AT archeryang guójūndiànnǎojiànshíbiāozhǔnzuòyèchéngxùzhīyánjiū AT yánglǐfēng guójūndiànnǎojiànshíbiāozhǔnzuòyèchéngxùzhīyánjiū AT archeryang studyofcomputerforensicsstandardoperatingprocedureinmilitarysystem AT yánglǐfēng studyofcomputerforensicsstandardoperatingprocedureinmilitarysystem |
_version_ |
1718133179975467008 |