PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Methods to acquisition digital evidence for computer forensics

Autorzy
Treść / Zawartość
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
Computer forensics is a key science and competency in meeting the growing risks of cybercrime, as well as for criminal investigation generally. In order to provide irrefutable evidence of a potential crime, a specialist in the incident response team (e.g. an IT forensics specialist) must secure the digital evidence in accordance with the correct procedure. There are no strict guidelines on how to do this. It is known that the authenticity and fidelity of data must be preserved. This article will collect good practices developed by specialists in the field of computer forensics. The process of securing the evidence material from a digital data sources for later analysis will be presented.
Twórcy
autor
  • Siedlce University of Natural Sciences and Humanities, Faculty of Exact and Natural Sciences, Institute of Computer Science, ul. 3 Maja 54, 08-110 Siedlce, Poland
Bibliografia
  • 1. Appendix B - Incident Response Forms - Incident Response and Computer Forensics, 3rd Edition. Form 1 – Evidence Tag. Web site: https://ir3e.com/appendix-b/ [date of access: 01.03.2022]
  • 2. Nikkel B.: Practical Forensic Imaging. Securing Digital Evidence with Linux Tools. No Starch Press, September 2016, 320 pp.
  • 3. Altheide C., Harlan Carvey: Digital Forensics with Open Source Tools. Elsevier, 2011
  • 4. Cost Of Cyber Crime Study. Ponemon Institute, 2017. https://www.accenture.com/_acnmedia/PDF-62/Accenture-2017CostCybercrime-US-FINAL.pdf [date of access: 01.03.2022]
  • 5. Cost Of Cyber Crime Study. Ponemon Institute, 2019. https://www.accenture.com/_acnmedia/PDF-96/Accenture-2019-Cost-of-Cybercrime-Study-Final.pdf [date of access: 01.03.2022]
  • 6. Cybercrime To Cost The World $10.5 Trillion Annually By 2025. Cyber Crime Magazine. Web site: https://cybersecurityventures.com/cybercrime-damages-6-trillion-by-2021/ [date of access: 01.03.2022]
  • 7. Farmer D., Venema W.: Forensic Discovery. Chapter 1. The spirit of forensic Discovery. Web site: http://www.porcupine.org/forensics/forensic-discovery/chapter1.html [date of access: 01.03.2022]
  • 8. Ekspert informatyki śledczej – Mediarecovery Web site: https://mediarecovery.pl/ekspert-informatyki-sledczej/ [date of access: 01.03.2022]
  • 9. Group work: A Road Map for Digital Forensic Research. Procedings: The Digital Forensic Research Conference DFRWS 2001, Utica, New York, USA, August 7-8, 2001, 44 pp.
  • 10. Mandia K., Pepe M., Jason T. Luttgens: Incident Response and Computer Forensics, Third Edition. McGraw-Hill Professional Publishing, 2014
  • 11. LinuxLive USB Creator. Web site: https://www.linuxliveusb.com/ [date of access:01.03.2022]
  • 12. Cichonski P., Millar T., Grance T., Scarfone K.: Computer Security Incident Handling Guide. Recommendations of the National Institute of Standards and Technology. Special Publication 800-61 Revision 2, National Institute of Standards and Technology, August 2012
  • 13. Kumar S., Gupta E. P.: A Comparative Analysis of SHA and MD5 Algorithm. International Journal of Information Technology and Computer Science 5(3), pp. 4492-4495, June 2014.
  • 14. Fratepietro S., Rossetti A., Dal Checco P.: Deft 7 manual. Digital Evidence & Forensic Toolkit. https://paper.bobylive.com/System/EN-deft7.pdf [date of access: 01.03.2022]
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-9af7d32a-0bad-4032-9b0e-88628c7bb0ab
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.