A Study of Computer Forensics Standard Operating Procedure in Military System

碩士 === 華梵大學 === 資訊管理學系碩士班 === 97 === Computer forensics is an emerging field of the information security. Many countries currently plan to develop dedicated computer crime units; training professionals and developing computer forensic hardware and software to find out key security breach evidences w...

Full description

Bibliographic Details
Main Authors: Archer Yang, 楊禮峰
Other Authors: Huei-Chung Chu
Format: Others
Language:zh-TW
Published: 2009
Online Access:http://ndltd.ncl.edu.tw/handle/35697280996065137811
id ndltd-TW-097HCHT0396048
record_format oai_dc
spelling ndltd-TW-097HCHT03960482015-11-20T04:19:26Z http://ndltd.ncl.edu.tw/handle/35697280996065137811 A Study of Computer Forensics Standard Operating Procedure in Military System 國軍電腦鑑識標準作業程序之研究 Archer Yang 楊禮峰 碩士 華梵大學 資訊管理學系碩士班 97 Computer forensics is an emerging field of the information security. Many countries currently plan to develop dedicated computer crime units; training professionals and developing computer forensic hardware and software to find out key security breach evidences with high-tech computer equipment. The common goal is of these efforts is to let the Computer Forensic results, e.g., the digital evidences, be valid, convincing evidences in the court. In recent years, many cases of the military information occurred, thus our army has become aware of the importance of computer forensics. The administrative investigation these leakages is the one of major works in the future since there are wide scopes in the computer crime; the relevant laws and regulations, equipment, professional, technical manpower, forensic procedures are too much to be handled by our current forensics technology. Any mistake in the above factors will significantly affect the forensic results. This paper thus proposes a new Taiwan MND computer forensic standard operating process that is suitable for uses in our army. The security goals are achieved by using the Delphi method to revise the key critical success factors of the operating procedures in the standard international forensic formats. The Taiwan MND was proved by the over 10 experts and scholars and front-line staff with the analytic questionnaire. Based on analytic results, the Taiwan MND is a good procedure to improve our current procedures and to apply in our authorities. Huei-Chung Chu 朱惠中 2009 學位論文 ; thesis 149 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 華梵大學 === 資訊管理學系碩士班 === 97 === Computer forensics is an emerging field of the information security. Many countries currently plan to develop dedicated computer crime units; training professionals and developing computer forensic hardware and software to find out key security breach evidences with high-tech computer equipment. The common goal is of these efforts is to let the Computer Forensic results, e.g., the digital evidences, be valid, convincing evidences in the court. In recent years, many cases of the military information occurred, thus our army has become aware of the importance of computer forensics. The administrative investigation these leakages is the one of major works in the future since there are wide scopes in the computer crime; the relevant laws and regulations, equipment, professional, technical manpower, forensic procedures are too much to be handled by our current forensics technology. Any mistake in the above factors will significantly affect the forensic results. This paper thus proposes a new Taiwan MND computer forensic standard operating process that is suitable for uses in our army. The security goals are achieved by using the Delphi method to revise the key critical success factors of the operating procedures in the standard international forensic formats. The Taiwan MND was proved by the over 10 experts and scholars and front-line staff with the analytic questionnaire. Based on analytic results, the Taiwan MND is a good procedure to improve our current procedures and to apply in our authorities.
author2 Huei-Chung Chu
author_facet Huei-Chung Chu
Archer Yang
楊禮峰
author Archer Yang
楊禮峰
spellingShingle Archer Yang
楊禮峰
A Study of Computer Forensics Standard Operating Procedure in Military System
author_sort Archer Yang
title A Study of Computer Forensics Standard Operating Procedure in Military System
title_short A Study of Computer Forensics Standard Operating Procedure in Military System
title_full A Study of Computer Forensics Standard Operating Procedure in Military System
title_fullStr A Study of Computer Forensics Standard Operating Procedure in Military System
title_full_unstemmed A Study of Computer Forensics Standard Operating Procedure in Military System
title_sort study of computer forensics standard operating procedure in military system
publishDate 2009
url http://ndltd.ncl.edu.tw/handle/35697280996065137811
work_keys_str_mv AT archeryang astudyofcomputerforensicsstandardoperatingprocedureinmilitarysystem
AT yánglǐfēng astudyofcomputerforensicsstandardoperatingprocedureinmilitarysystem
AT archeryang guójūndiànnǎojiànshíbiāozhǔnzuòyèchéngxùzhīyánjiū
AT yánglǐfēng guójūndiànnǎojiànshíbiāozhǔnzuòyèchéngxùzhīyánjiū
AT archeryang studyofcomputerforensicsstandardoperatingprocedureinmilitarysystem
AT yánglǐfēng studyofcomputerforensicsstandardoperatingprocedureinmilitarysystem
_version_ 1718133179975467008