Computer Forensics-Digitized Science

被引:0
|
作者
Bahadur, Promila [1 ]
Yadav, Divakar Singh [2 ]
机构
[1] Maharishi Univ Management, Fairfield, IA 52557 USA
[2] Uttar Pradesh Tech Univ, Dr BR Ambedkar Engn Coll IT, Banda, India
关键词
Cyber-crime; Computer Forensics; Process; Life Cycle; Hex Editor;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In today's era 'Digital' is a house hold name. As some way or the other technology is part of our lives. Digital media can be seen as the live example of the same. Digitization is in the air. It is peeping in our lives up to so much of extent that even if anything goes wrong we can rebuild the scene and investigate, what went wrong. While investigation we have to check, whether the crime has taken place through some digital media or crime has taken place and now digital media is used to build up the scene of crime and evidences. In this paper, we have discussed the computer forensics life cycle and a very much capable tool to investigate the digital media-Hex Editor.
引用
收藏
页码:1025 / 1031
页数:7
相关论文
共 50 条
  • [1] A Comparative Study of Forensic Science and Computer Forensics
    Hankins, Ryan
    Uehara, Tetsutaroh
    Liu, Jigang
    [J]. 2009 THIRD IEEE INTERNATIONAL CONFERENCE ON SECURE SOFTWARE INTEGRATION AND RELIABILITY IMPROVEMENT, PROCEEDINGS, 2009, : 230 - 239
  • [2] Development of masters modules in computer forensics and cybercrime for computer science and forensic science students
    Overill, Richard E.
    [J]. INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2009, 2 (02) : 132 - 140
  • [3] Multimedia Forensics Is Not Computer Forensics
    Boehme, Rainer
    Freiling, Felix C.
    Gloe, Thomas
    Kirchner, Matthias
    [J]. COMPUTATIONAL FORENSICS, PROCEEDINGS, 2009, 5718 : 90 - +
  • [4] A Computer Science Course in Cyber Security and Forensics for a Multidisciplinary Audience
    Lawrence-Fowler, Wendy A.
    [J]. 2013 IEEE FRONTIERS IN EDUCATION CONFERENCE, 2013,
  • [5] Computer forensics
    Allen, WH
    [J]. IEEE SECURITY & PRIVACY, 2005, 3 (04) : 59 - 62
  • [6] An introduction to computer forensics
    Furneaux, Nick
    [J]. MEDICINE SCIENCE AND THE LAW, 2006, 46 (03) : 213 - 218
  • [7] Advances in Computer Forensics
    Abdullah, Mohd Taufik
    Mahmod, Ramlan
    Ab Ghani, Abdul Azim
    Abdullah, Mohd Zain
    Sultan, Abu Bakar Md
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2008, 8 (02): : 215 - 219
  • [8] Computer forensics and culture
    Lin, Yi-Chi
    Slay, Jill
    Lin, I. -Long
    [J]. INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2008, 5075 : 288 - +
  • [9] Computer forensics in forensis
    Peisert, Sean
    Bishop, Matt
    Marzullo, Keith
    [J]. SADFE 2008: THIRD INTERNATIONAL WORKSHOP ON SYSTEMATIC APPROACHES TO DIGITAL FORENSIC ENGINEERING, PROCEEDINGS, 2008, : 102 - +
  • [10] Mastering computer forensics
    Armstrong, CJ
    [J]. SECURITY EDUCATION AND CRITICAL INFRASTRUCTURES, 2003, 125 : 151 - 158