File Time of Forensic Evidence – Example of NTFS and ExtX

碩士 === 華梵大學 === 資訊管理學系碩士班 === 98 === When the information technology and network is getting popular more and more, it makes everyone in the world to have convenience. When something is getting popular, it will be crime tools. Every action always have some method to trace, so do the crimes. What a...

Full description

Bibliographic Details
Main Authors: Shih-Kang Yen, 顏世剛
Other Authors: Huei-Chung Chu
Format: Others
Language:zh-TW
Published: 2010
Online Access:http://ndltd.ncl.edu.tw/handle/16235860964753247873
id ndltd-TW-098HCHT0396009
record_format oai_dc
spelling ndltd-TW-098HCHT03960092015-11-11T04:15:07Z http://ndltd.ncl.edu.tw/handle/16235860964753247873 File Time of Forensic Evidence – Example of NTFS and ExtX 檔案時間鑑識取證初探—以NTFS及ExtX為例 Shih-Kang Yen 顏世剛 碩士 華梵大學 資訊管理學系碩士班 98 When the information technology and network is getting popular more and more, it makes everyone in the world to have convenience. When something is getting popular, it will be crime tools. Every action always have some method to trace, so do the crimes. What about the computer crimes? In computer crime, it will be computer forensics to understand crime and find criminal. About computer forensics, it's a technique to find the proof, do some analyze and make up the digital evidences, let it can be use in the court. All of the computer forensics need consider different part of information, such as hardware, software, file name, file size, file time, hidden file...etc. All the things happened in criminal locale have relationship. Each thing needs time to combine, so as the computer crime. Different operating systems have its own file system, and different file system have her own structure and rules. In this paper, the purpose is to found the rules of file time. Simulate two file systems NTFS and ExtX in different scenarios, observe and record how the file time getting change. Forensics member use the record of how the file time getting change to avoid digital evidence lose the proof. Huei-Chung Chu 朱惠中 2010 學位論文 ; thesis 76 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 華梵大學 === 資訊管理學系碩士班 === 98 === When the information technology and network is getting popular more and more, it makes everyone in the world to have convenience. When something is getting popular, it will be crime tools. Every action always have some method to trace, so do the crimes. What about the computer crimes? In computer crime, it will be computer forensics to understand crime and find criminal. About computer forensics, it's a technique to find the proof, do some analyze and make up the digital evidences, let it can be use in the court. All of the computer forensics need consider different part of information, such as hardware, software, file name, file size, file time, hidden file...etc. All the things happened in criminal locale have relationship. Each thing needs time to combine, so as the computer crime. Different operating systems have its own file system, and different file system have her own structure and rules. In this paper, the purpose is to found the rules of file time. Simulate two file systems NTFS and ExtX in different scenarios, observe and record how the file time getting change. Forensics member use the record of how the file time getting change to avoid digital evidence lose the proof.
author2 Huei-Chung Chu
author_facet Huei-Chung Chu
Shih-Kang Yen
顏世剛
author Shih-Kang Yen
顏世剛
spellingShingle Shih-Kang Yen
顏世剛
File Time of Forensic Evidence – Example of NTFS and ExtX
author_sort Shih-Kang Yen
title File Time of Forensic Evidence – Example of NTFS and ExtX
title_short File Time of Forensic Evidence – Example of NTFS and ExtX
title_full File Time of Forensic Evidence – Example of NTFS and ExtX
title_fullStr File Time of Forensic Evidence – Example of NTFS and ExtX
title_full_unstemmed File Time of Forensic Evidence – Example of NTFS and ExtX
title_sort file time of forensic evidence – example of ntfs and extx
publishDate 2010
url http://ndltd.ncl.edu.tw/handle/16235860964753247873
work_keys_str_mv AT shihkangyen filetimeofforensicevidenceexampleofntfsandextx
AT yánshìgāng filetimeofforensicevidenceexampleofntfsandextx
AT shihkangyen dàngànshíjiānjiànshíqǔzhèngchūtànyǐntfsjíextxwèilì
AT yánshìgāng dàngànshíjiānjiànshíqǔzhèngchūtànyǐntfsjíextxwèilì
_version_ 1718127669477900288