登入
選單
返回
Google圖書搜尋
Managing Information Security
Scott R. Ellis
其他書名
Chapter 9. Cyber Forensics
出版
Elsevier Inc. Chapters
, 2013-08-21
主題
Computers / Computer Science
Computers / Security / General
ISBN
0128073950
9780128073957
URL
http://books.google.com.hk/books?id=DadzDAAAQBAJ&hl=&source=gbs_api
EBook
SAMPLE
註釋
Electronic evidence and information gathering have become central issues in an increasing number of conflicts and crimes. Electronic or cyber evidence used to mean the regular print-out from a computer—and a great deal of cyber exhibits in court are just that. But, for many years, law enforcement officers have been seizing data media and computers themselves, as they have become smaller and more ubiquitous. In the very recent past, investigators generated their own print-outs, sometimes using the original application program, sometimes specialist analytic and examination tools. More recently, investigators have found ways of collecting evidence from remote computers to which they do not have immediate physical access, provided such computers are accessible via a phone line or network connection. It is even possible to track activities across a cyber network, including the Internet. These procedures form part of what is called cyber forensics, though some people also use the term to include the use of computers to analyze complex data (for example, connections between individuals by examination of telephone logs and/or bank account transactions). Another use of the term is when computers are employed in the court itself, in the form of cyber graphics, to illustrate a complex situation such as a fraud or as a replacement for large volumes of paper-based exhibits and statements. This chapter is intended to provide in-depth information on cyber forensics as a career, a job, and a science. It will help you avoid mistakes and find your way through the many aspects of this diverse and rewarding field.