Home > CSC-OpenAccess Library > Manuscript Information
EXPLORE PUBLICATIONS BY COUNTRIES |
EUROPE | |
MIDDLE EAST | |
ASIA | |
AFRICA | |
............................. | |
United States of America | |
United Kingdom | |
Canada | |
Australia | |
Italy | |
France | |
Brazil | |
Germany | |
Malaysia | |
Turkey | |
China | |
Taiwan | |
Japan | |
Saudi Arabia | |
Jordan | |
Egypt | |
United Arab Emirates | |
India | |
Nigeria |
Computer Forensic: A Reactive Strategy for Fighting Computer Crime
Abdullahi Mohammed, Enoch O. Nwachukwu
Pages - 157 - 163 | Revised - 31-05-2015 | Published - 30-06-2015
MORE INFORMATION
KEYWORDS
Computer Forensic, Digital Evidence, Digital Forensic, Time Stamp, Computer Crime.
ABSTRACT
Computer Forensics is the science of obtaining, preserving, documenting and presenting digital evidence, stored in the form of encoded information, from digital electronic storage devices, such as computers, Personal Digital Assistance (PDA), digital cameras, mobile phones and various memory storage devices. All must be done in a manner designed to preserve the probative value of the evidence and to assure its admissibility in legal proceeding. The word forensics means “to bring to the court”. Forensics deals primarily with the recovery and analysis of latent evidence. Latent evidence can take many forms, from fingerprints left on a window to deoxyribonucleic acid (DNA) evidence recovered from blood stains to the files on a hard drive. This paper provides a high-level overview on computer forensics investigation phases for both technical and nontechnical audience. Although the term “computer” is used, the concept applies to any device capable of storing digital information.
A. J. Marcella, Jr. and D. Menendez. "Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes," (2nd Edition): Taylor & Francis Group, LLC. 2008. | |
A. Richard, H. Val and M. Graham (2012). "'The Advanced Data Acquisition Model (ADAM): A process model for digital forensic practice" Journal of Digital Forensics, Security and Law, Vol. 8(4). | |
AAFS. “So you want to be a forensic scientist?” American Academy of Forensic Science, Available at: http://www.aafs.org/default.asp?section_id=resources&page_id=choosing_a_career | |
B. Carrier (2001) "Defining digital forensic examination and analysis tools". Digital Research Workshop II. CiteSeerX: 10.1.1.14.8953. | |
B. Carrier, (2001b). “Defining Digital Forensic examination and Analysis Tools” Digital Research Workshop II. Available at: www.acm.org [Accessed on 15/10/2012]. | |
B. Schatz. “Digital Evidence: Representation and Assurance”. Doctorate Thesis, Submitted to Information Security Institute, Faculty of Information Technology, Queensland University of Technology, 2010. | |
C. Eoghan (2004). "Digital Evidence and Computer Crime, Second Edition". Elsevier. ISBN 012-163104-4. | |
E.O. Nwachukwu, A Mohammed. D.C. Igweze and V.O. Ewulonu "Microsoft Windows Based Computer Forensic" International Journal of Information Technology and Business Management; 2927(1):2012-2014. | |
F. Adelstein. "MFP: The Mobile Forensic Platform". International Journal Of Digital Evidence, Spring 2003, Volume 2. Issue 1. | |
Federal Rule of Evidence. Available at; http://federalevidence.com/rules-ofevidence#Rule702 Retrieved on 2nd May, 2014. | |
G. Palmer, G. “A road Map for Digital Forensic Research, in First Digital Forensic Research Workshop”, G. Palmer, Editor. 2001: Ucita, New York. www.acm.org. | |
J. Beckett, J., “Digital Forensics: Validation and Verification in a Dynamic Work Environment”. 40th Annual Hawaii International Conference on System Science. 2007: Hawaii. | |
J. E. Regan. "The Forensic Potential of Flash Memory". Master's Thesis. Naval Postgraduate School, Monterey, CA, 2009. | |
M Reith, C Carr and G Gunsch, (2002).“Anexamination of Digital Forensic models”. International Journal of Digital Evidence [online]. Available at: www.acm.org [Accessed on 15/10/2012]. | |
N.L Beebe and J.G Clark. “A Hierarchical, Objectives-Based Framework for Digital Investigations Process”, 4th Digital Forensics Research Workshop. 2004: Baltimore, MD. | |
National Institute of Justice. "Electronic Crime Scene Investigation: A Guide for First Responder". Washington, D.C.: U.S. Department of Justice, National Institute of Justice, 2004. NCJ 187736. http://www.ojp.usdoj.gov/nij. | |
R. McKemmish, 1999, “What is Forensic Computing?” Trends and Issues in Crime and Criminal Justice, Australian Institute of Criminology. Available at: http://aic.gov.au/documents/9/C/A/%7B9CA41AE8-EADB-4BBF-989464E0DF87BDF7%7Dti118.pdf [Accessed on 20/10/2012] | |
S. Garfinkel, "Forensic Feature Extraction and Cross-Drive Analysis". The 6th Annual Digital Forensic Research Workshop Lafayette, Indiana, August 14-16, 2006. | |
Mr. Abdullahi Mohammed
University of Portharcourt - Nigeria
Abdulmohammedabdul@yahoo.com
Mr. Enoch O. Nwachukwu
University of Portharcourt - Nigeria
|
|
|
|
View all special issues >> | |
|
|