Font Size: a A A

The Implemented Computer Evidence Forensics Technology Research

Posted on:2012-04-19Degree:MasterType:Thesis
Country:ChinaCandidate:M F WangFull Text:PDF
GTID:2218330368498360Subject:Software engineering
Abstract/Summary:PDF Full Text Request
Due to the growing popularity of computer network technology, many traditional issues are moving toward the direction of network development, a cyber-extortion has emerged in, Internet gambling, drug trafficking and other forms of network, but in reality some of the criminal cases are police from the computer network needs to find evidence of a crime and detection clues. This allows the judiciary must face computer evidence and computer evidence for the application problem.In this thesis, Computer Forensics Analysis, based on the analysis of the current research and implementation in computer forensics on the existence of defects, and the first definition of computer evidence, characteristics, and legal form of a brief overview. Or in terms of characteristics that improve computer evidence from the legal status, should the computer evidence as an independent form of evidence for research.As evidence of the rigor and the characteristics of computer evidence, forensic evidence, the process of making the computer must follow a strict procedure, or they may reduce the legitimacy and credibility of computer evidence. In the study of computer forensics process, domestic and foreign scholars have proposed a variety of computer forensic evidence and evidence collection model to guide product development and specification of evidence process. However, these models have this or that defects, this thesis in the existing model of computer forensics, computer forensics work, according to the actual problems encountered, proposed a more complete working model of computer forensics, to guide computer forensics work smoothly, and also the preparation of computer forensics, computer forensics and computer evidence analysis of the evidence were all carried out a detailed study, with a view to study computer forensics technology to provide a little help.
Keywords/Search Tags:computer evidence, working model, log file review, network address tracking, data warehouse and data mining
PDF Full Text Request
Related items