Font Size: a A A

Technology Of Computer Crime Forensic And Its Application

Posted on:2007-05-21Degree:MasterType:Thesis
Country:ChinaCandidate:X H LiuFull Text:PDF
GTID:2178360182994281Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
The rapid development of computer technology has changed the way of the living, production and management. It also presents new guilty ways for the criminals. The new types of crimes by taking the computer information system as the object and tools are increasing. It' s getting more harmful. How to get the evidence of computer criminals become a new task of the law and computer science area. Computer forensic, as a area of computer science and law, becomes a focus of attention.Computer forensics is the technology field that attempts to prove thorough, efficient, and secure means to investigate computer crime. Computer evidence must be authentic, accurate, complete and convincing to juries. In this paper, the stages of computer forensics and the forensics tools are presented, comparing these tools. The theories of data recover, the theories and the realization of the forensics software are described. Two examples about forensic practice are also given. The deficiency of computer forensics technique and anti-forensics are also discussed. The result comes out that it is as the improvement of computer science technology, the forensics technique will become more integrated and thorough. For this deficiency, the new forensic model was proposed here. Comparing with traditional computer forensic model, the major differenced between these two models lies on the distributed structure and the mechanism of dynamical data gathering. With this two characteristics, forensics system based on the new model could gather real-time evidences dynamically in a distributed system, and save this evidences in a safe place in time. So unauthorised deletion, change to evidences could be detected and prevented. Then the stored evidences could be used for further analysis and review. So rapidly finding invaders and explaining the process.
Keywords/Search Tags:computer crime, computer forensic, electronic evidence, dynamic forensics, integrality of evidence
PDF Full Text Request
Related items