File Time of Forensic Evidence – Example of NTFS and ExtX
碩士 === 華梵大學 === 資訊管理學系碩士班 === 98 === When the information technology and network is getting popular more and more, it makes everyone in the world to have convenience. When something is getting popular, it will be crime tools. Every action always have some method to trace, so do the crimes. What a...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2010
|
Online Access: | http://ndltd.ncl.edu.tw/handle/16235860964753247873 |
id |
ndltd-TW-098HCHT0396009 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-098HCHT03960092015-11-11T04:15:07Z http://ndltd.ncl.edu.tw/handle/16235860964753247873 File Time of Forensic Evidence – Example of NTFS and ExtX 檔案時間鑑識取證初探—以NTFS及ExtX為例 Shih-Kang Yen 顏世剛 碩士 華梵大學 資訊管理學系碩士班 98 When the information technology and network is getting popular more and more, it makes everyone in the world to have convenience. When something is getting popular, it will be crime tools. Every action always have some method to trace, so do the crimes. What about the computer crimes? In computer crime, it will be computer forensics to understand crime and find criminal. About computer forensics, it's a technique to find the proof, do some analyze and make up the digital evidences, let it can be use in the court. All of the computer forensics need consider different part of information, such as hardware, software, file name, file size, file time, hidden file...etc. All the things happened in criminal locale have relationship. Each thing needs time to combine, so as the computer crime. Different operating systems have its own file system, and different file system have her own structure and rules. In this paper, the purpose is to found the rules of file time. Simulate two file systems NTFS and ExtX in different scenarios, observe and record how the file time getting change. Forensics member use the record of how the file time getting change to avoid digital evidence lose the proof. Huei-Chung Chu 朱惠中 2010 學位論文 ; thesis 76 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 華梵大學 === 資訊管理學系碩士班 === 98 === When the information technology and network is getting popular more and more, it makes everyone in the world to have convenience. When something is getting popular, it will be crime tools. Every action always have some method to trace, so do the crimes. What about the computer crimes? In computer crime, it will be computer forensics to understand crime and find criminal. About computer forensics, it's a technique to find the proof, do some analyze and make up the digital evidences, let it can be use in the court. All of the computer forensics need consider different part of information, such as hardware, software, file name, file size, file time, hidden file...etc.
All the things happened in criminal locale have relationship. Each thing needs time to combine, so as the computer crime. Different operating systems have its own file system, and different file system have her own structure and rules. In this paper, the purpose is to found the rules of file time. Simulate two file systems NTFS and ExtX in different scenarios, observe and record how the file time getting change. Forensics member use the record of how the file time getting change to avoid digital evidence lose the proof.
|
author2 |
Huei-Chung Chu |
author_facet |
Huei-Chung Chu Shih-Kang Yen 顏世剛 |
author |
Shih-Kang Yen 顏世剛 |
spellingShingle |
Shih-Kang Yen 顏世剛 File Time of Forensic Evidence – Example of NTFS and ExtX |
author_sort |
Shih-Kang Yen |
title |
File Time of Forensic Evidence – Example of NTFS and ExtX |
title_short |
File Time of Forensic Evidence – Example of NTFS and ExtX |
title_full |
File Time of Forensic Evidence – Example of NTFS and ExtX |
title_fullStr |
File Time of Forensic Evidence – Example of NTFS and ExtX |
title_full_unstemmed |
File Time of Forensic Evidence – Example of NTFS and ExtX |
title_sort |
file time of forensic evidence – example of ntfs and extx |
publishDate |
2010 |
url |
http://ndltd.ncl.edu.tw/handle/16235860964753247873 |
work_keys_str_mv |
AT shihkangyen filetimeofforensicevidenceexampleofntfsandextx AT yánshìgāng filetimeofforensicevidenceexampleofntfsandextx AT shihkangyen dàngànshíjiānjiànshíqǔzhèngchūtànyǐntfsjíextxwèilì AT yánshìgāng dàngànshíjiānjiànshíqǔzhèngchūtànyǐntfsjíextxwèilì |
_version_ |
1718127669477900288 |