DocumentCode :
830927
Title :
An overview of computer forensics
Author :
Dixon, Phillip D.
Author_Institution :
Maryland Univ., USA
Volume :
24
Issue :
5
fYear :
2005
Firstpage :
7
Lastpage :
10
Abstract :
The core goals of computer forensics are fairly straightforward: the preservation, identification, extraction, documentation, and interpretation of computer data. There are several policies and procedures that need to be out-lined and defined with regard to computer forensics are analyzed in this paper. Data must be able to be retrieved and analyzed without it is damaged. The authenticity of the data is also ensured. The widespread usage of computer forensics has resulted from the convergence of two factors: the increasing dependence of law enforcement on computing and the ubiquity of computers that followed from the microcomputer revolution. There is a plethora of hardware and software tools available to assist with the interpretation of forensic data. The AccessData Forensic Toolkit can be used by both law enforcement and the private sector to run complete forensic examinations of a computer.
Keywords :
computer crime; information retrieval; message authentication; software tools; ubiquitous computing; AccessData Forensic Toolkit; computer forensics; data extraction; data preservation; data retrieval; documentation authenticity; forensic data interpretation; hardware-software tool; information identification; law enforcement; microcomputer revolution; private sector; ubiquity computing; Business; Companies; Computer crime; Contracts; Forensics; Government; Law; Legal factors; Military computing; Terrorism;
fLanguage :
English
Journal_Title :
Potentials, IEEE
Publisher :
ieee
ISSN :
0278-6648
Type :
jour
DOI :
10.1109/MP.2005.1594001
Filename :
1594001
Link To Document :
بازگشت