Font Size: a A A

The Research And Design Of Computer Forensics

Posted on:2009-07-18Degree:MasterType:Thesis
Country:ChinaCandidate:Z Q WangFull Text:PDF
GTID:2178360242485242Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
With the development of computer technology and the prevalent network, people are exposed to frequent occurrence of crimes committed by or aimed at computers. However, the politics and law institutions lack such necessary high-tech support to attain the most extensive electronic evidence of the computer-related crimes to penalize the offenders. In order to enhance the abilities of attacking computer-related offences, we need to conduct a profound study on the field of computer forensics, which is related to the computer forensics technology in question and requires not only the development of effective forensics tools, but also the research on its definition, standards, proceedings and some other basic theories. Computer forensics is a newly emerged interdisciplinary study encompassing subjects such as computer science, legal science and criminal scientific technology.Based on a relatively thorough literature review, this paper concludes the next points:1. The emergence, development, status and the prospective research of computer forensics.2. It also makes a comprehensive introduction of the basic concepts, relevant technology and theories, basic principles and practical tools, etc relating to the field of computer forensics.3. It designs and develops a computer synthetical forensics system based on the previous research made both at home and abroad. The system is divided into static electronic evidence collection and dynamic electronic evidence collection systems as regards the different timing of attaining the electronic evidence. The static electronic evidence collection system integrates a variety of forensics technology and it thoroughly extracts the disc information including the deleted files and the system information. Dynamic electronic evidence collection systems use monitor to get eynamic electronic evidence , get the second attack evidence.4. Based on finding the electronic evidence on computer , we can find the holes the computer has, and we will repair them . By the researching on weak password detect's theoretics, This paper design a software system that can find the computer's weak password.and scan the CGI's hole.
Keywords/Search Tags:computer forensics, electronic evidence, monitor, weak password
PDF Full Text Request
Related items