Methods to acquisition digital evidence for computer forensics.
Saved in:
| Title: | Methods to acquisition digital evidence for computer forensics. |
|---|---|
| Authors: | PILSKI, Marek |
| Source: | Studia Informatica. System & information technology; 2022, Vol. 26 Issue 1, p73-84, 12p |
| Subject Terms: | DIGITAL forensics, ELECTRONIC evidence, COMPUTER crimes, CRIMINAL investigation, DATA acquisition systems |
| Abstract: | Computer forensics is a key science and competency in meeting the growing risks of cybercrime, as well as for criminal investigation generally. In order to provide irrefutable evidence of a potential crime, a specialist in the incident response team (e.g. an IT forensics specialist) must secure the digital evidence in accordance with the correct procedure. There are no strict guidelines on how to do this. It is known that the authenticity and fidelity of data must be preserved. This article will collect good practices developed by specialists in the field of computer forensics. The process of securing the evidence material from a digital data sources for later analysis will be presented. [ABSTRACT FROM AUTHOR] |
| Copyright of Studia Informatica. System & information technology is the property of Siedlce University of Natural Sciences & Humanities and its content may not be copied or emailed to multiple sites without the copyright holder's express written permission. Additionally, content may not be used with any artificial intelligence tools or machine learning technologies. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.) | |
| Database: | Complementary Index |
Be the first to leave a comment!
Nájsť tento článok vo Web of Science