Home   >   CSC-OpenAccess Library   >    Manuscript Information
Techniques in Computer Forensics: A Recovery Perspective
Bhanu Prakash Battula, KeziaRani , Satya Prasad , T. Sudha
Pages - 27 - 35     |    Revised - 05-05-2009     |    Published - 18-05-2009
Volume - 3   Issue - 2    |    Publication Date - April 2009  Table of Contents
MORE INFORMATION
KEYWORDS
Computer Forensics, Fraud, Disks
ABSTRACT
Computer forensics has recently gained significant popularity with many local law enforcement agencies. It is currently employed in fraud, theft, drug enforcement and almost every other enforcement activity. The research paper includes the types of attempts to destroy or tamper the files by the culprits and unleashes various recovery techniques, and their significance in different situations from those attempts, which destroy files or inflict physical damage to the computer. The paper also presents the nature and immediate need of enhancing the existing automated forensics tools. The paper gives a quick glance of various methods used by culprits to destroy the information in the electronic storage media and their corresponding forensic approach done by the computer forensic experts in the perspective of recovery.
CITED BY (6)  
1 Bhosale, D. V., Mitkal, P. K., Pawar, R. N., & Paranjape, R. S. (2016). Review on Computer Forensic. Training, 2(01).
2 Çakir, H., & Kiliç, M. S. (2016). The keyword search method and its importance in computer forensics Adli bilisimde anahtar kelime aramasi metodu ve önemi. Journal of Human Sciences, 13(1), 2368-2384.
3 Velakanti, G., & Katuri, A. (2014). Enhancement of Existing Tools and Techniques for Computer Forensic Investigation. International Journal of Computer Science and Network Security (IJCSNS), 14(12), 74.
4 Bryant, M. S., & Bryant, R. (Eds.). (2014). Policing Digital Crime. Ashgate Publishing, Ltd..
5 Khoury, I., & Caushaj, E.computer forensic.
6 Andrade, M., & Ferreira, M. A. M. (2009). Criminal and civil identification with DNA databases using Bayesian networks. International Journal of Security, 3(4), 65-74.
1 Google Scholar 
2 ScientificCommons 
3 Academic Index 
4 CiteSeerX 
5 refSeek 
6 iSEEK 
7 Socol@r  
8 ResearchGATE 
9 Bielefeld Academic Search Engine (BASE) 
10 Scribd 
11 WorldCat 
12 SlideShare 
13 PDFCAST 
14 PdfSR 
15 Free-Books-Online 
Andrew S.Tanenbaum, “Modern Operating Systems” Prentice Hall, Dec. 2007
Anthony Verducci, “How to Absolutely, Positively Destroy Your Data”: DIY Tech, February 2007.
Charles H Sobey, “Recovering unrecoverable data”, Channel Science white paper, 14th April 2004.
David Icove, Karl Seqer, William Von Storch, “Computer crime: A Crime-figher’s Handbook”,
David Icove, Karl Seqer, William Von Storch, “Computer crime: A Crime-figher’s Handbook”, O'Reilly Media, Inc, USA (1 Aug 1995).
Dinan, Thomas Edward, Robertson, Neil Leslie, Tam, Alan Jun-yuan, “Magnetic head for hard disk drive having varied composition nickel-iron alloy magnetic poles”, U.S. Patent No. 6,912,771. July 5, 2005.
G.Shpantzer and T.Ipsen, “Law Enforcement Challenges in Digital Forensics.” Proc.
Guy Hart-Davis,”Windows(R) XP Professional: The Complete Reference” McGraw-Hill Osborne, Dec. 2002.
http://en.wikipedia.org/wiki/EnCase.
http://www.computerforensics.net/forensics.htm
http://www.digitalintelligence.com/software/disoftware/drivespy/
http://www.forensics.com
http://www.x-ways.net/forensics/index-m.html.
M. Villano, “Hard-Drive Magic: Making Data Disappear Forever”, New York
Michele C. S. Lange, Kristin M. Nimsger, ‘’Electronic evidence and discovery’’, American Bar Association, 2004.
Nelson, Bill, Philips, Amelia, Enfinger, Frank and Stewart, Chris, “Guide to Computer Forensics and Investigations”, Thomson, Cousre Technology, Boston, 2004.
Peterson, Siberschaz, Galvin, “Secondary Storage Structure, Advanced Operating
S.Berinato, “Good Stuff Cheap”, CIO, 15 Oct.2002 pp 53-59.
Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal
Simson L. Garfinkel and Abhi Shelat, “Remembrance of Data Passed: A Study of Disk Sanitization Practices”, IEEE Security & Privacy, Vol. 1, 2003, pp. 17-27.
Thomas Rude CISSP, “Evidence Seizure Methodology for Computer Forensics”.
Thomas Welch, “Handbook of information Security Management”, CRC Press LLC,
Wofle, Henry B, Computers and Security, El sevier Science, Ltd, pp. 26-28.
www.accessdata.com
www.forensicswiki.org/wiki/ILook
www.porcupine.org/forensics/tct.html
www.sleuthkit.org/
Mr. Bhanu Prakash Battula
- India
Mr. KeziaRani
- India
Mr. Satya Prasad
- India
Mr. T. Sudha
- India
thatimakula_sudha@yahoo.com


CREATE AUTHOR ACCOUNT
 
LAUNCH YOUR SPECIAL ISSUE
View all special issues >>
 
PUBLICATION VIDEOS