Home > CSC-OpenAccess Library > Manuscript Information
EXPLORE PUBLICATIONS BY COUNTRIES |
EUROPE | |
MIDDLE EAST | |
ASIA | |
AFRICA | |
............................. | |
United States of America | |
United Kingdom | |
Canada | |
Australia | |
Italy | |
France | |
Brazil | |
Germany | |
Malaysia | |
Turkey | |
China | |
Taiwan | |
Japan | |
Saudi Arabia | |
Jordan | |
Egypt | |
United Arab Emirates | |
India | |
Nigeria |
Techniques in Computer Forensics: A Recovery Perspective
Bhanu Prakash Battula, KeziaRani , Satya Prasad , T. Sudha
Pages - 27 - 35 | Revised - 05-05-2009 | Published - 18-05-2009
Published in International Journal of Security (IJS)
MORE INFORMATION
KEYWORDS
Computer Forensics, Fraud, Disks
ABSTRACT
Computer forensics has recently gained significant popularity with many local law
enforcement agencies. It is currently employed in fraud, theft, drug enforcement
and almost every other enforcement activity. The research paper includes the
types of attempts to destroy or tamper the files by the culprits and unleashes
various recovery techniques, and their significance in different situations from
those attempts, which destroy files or inflict physical damage to the computer.
The paper also presents the nature and immediate need of enhancing the
existing automated forensics tools. The paper gives a quick glance of various
methods used by culprits to destroy the information in the electronic storage
media and their corresponding forensic approach done by the computer forensic
experts in the perspective of recovery.
1 | Bhosale, D. V., Mitkal, P. K., Pawar, R. N., & Paranjape, R. S. (2016). Review on Computer Forensic. Training, 2(01). |
2 | Çakir, H., & Kiliç, M. S. (2016). The keyword search method and its importance in computer forensics Adli bilisimde anahtar kelime aramasi metodu ve önemi. Journal of Human Sciences, 13(1), 2368-2384. |
3 | Velakanti, G., & Katuri, A. (2014). Enhancement of Existing Tools and Techniques for Computer Forensic Investigation. International Journal of Computer Science and Network Security (IJCSNS), 14(12), 74. |
4 | Bryant, M. S., & Bryant, R. (Eds.). (2014). Policing Digital Crime. Ashgate Publishing, Ltd.. |
5 | Khoury, I., & Caushaj, E.computer forensic. |
6 | Andrade, M., & Ferreira, M. A. M. (2009). Criminal and civil identification with DNA databases using Bayesian networks. International Journal of Security, 3(4), 65-74. |
Andrew S.Tanenbaum, “Modern Operating Systems” Prentice Hall, Dec. 2007 | |
Anthony Verducci, “How to Absolutely, Positively Destroy Your Data”: DIY Tech, February 2007. | |
Charles H Sobey, “Recovering unrecoverable data”, Channel Science white paper, 14th April 2004. | |
David Icove, Karl Seqer, William Von Storch, “Computer crime: A Crime-figher’s Handbook”, | |
David Icove, Karl Seqer, William Von Storch, “Computer crime: A Crime-figher’s Handbook”, O'Reilly Media, Inc, USA (1 Aug 1995). | |
Dinan, Thomas Edward, Robertson, Neil Leslie, Tam, Alan Jun-yuan, “Magnetic head for hard disk drive having varied composition nickel-iron alloy magnetic poles”, U.S. Patent No. 6,912,771. July 5, 2005. | |
G.Shpantzer and T.Ipsen, “Law Enforcement Challenges in Digital Forensics.” Proc. | |
Guy Hart-Davis,”Windows(R) XP Professional: The Complete Reference” McGraw-Hill Osborne, Dec. 2002. | |
http://en.wikipedia.org/wiki/EnCase. | |
http://www.computerforensics.net/forensics.htm | |
http://www.digitalintelligence.com/software/disoftware/drivespy/ | |
http://www.forensics.com | |
http://www.x-ways.net/forensics/index-m.html. | |
M. Villano, “Hard-Drive Magic: Making Data Disappear Forever”, New York | |
Michele C. S. Lange, Kristin M. Nimsger, ‘’Electronic evidence and discovery’’, American Bar Association, 2004. | |
Nelson, Bill, Philips, Amelia, Enfinger, Frank and Stewart, Chris, “Guide to Computer Forensics and Investigations”, Thomson, Cousre Technology, Boston, 2004. | |
Peterson, Siberschaz, Galvin, “Secondary Storage Structure, Advanced Operating | |
S.Berinato, “Good Stuff Cheap”, CIO, 15 Oct.2002 pp 53-59. | |
Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal | |
Simson L. Garfinkel and Abhi Shelat, “Remembrance of Data Passed: A Study of Disk Sanitization Practices”, IEEE Security & Privacy, Vol. 1, 2003, pp. 17-27. | |
Thomas Rude CISSP, “Evidence Seizure Methodology for Computer Forensics”. | |
Thomas Welch, “Handbook of information Security Management”, CRC Press LLC, | |
Wofle, Henry B, Computers and Security, El sevier Science, Ltd, pp. 26-28. | |
www.accessdata.com | |
www.forensicswiki.org/wiki/ILook | |
www.porcupine.org/forensics/tct.html | |
www.sleuthkit.org/ | |
Mr. Bhanu Prakash Battula
- India
Mr. KeziaRani
- India
Mr. Satya Prasad
- India
Mr. T. Sudha
- India
thatimakula_sudha@yahoo.com
|
|
|
|
View all special issues >> | |
|
|