Topic
Digital evidence
About: Digital evidence is a research topic. Over the lifetime, 1621 publications have been published within this topic receiving 18476 citations.
Papers published on a yearly basis
Papers
More filters
01 Jan 2012
TL;DR: In this paper, a comprehensive review on various techniques that helps to improve the system, analysis of different attack, detection of attack is presented, focusing on the critical stages of preservation and acquisition of digital evidence from the different source to be used as evidence for aiding investigation.
Abstract: Network forensics has been the most prevalent technology to investigate different attack. It used for troubleshooting connection issues and helping to solve various network security problems, such as system log, router log, and access control. Network Forensic help to identify the evidences of data source as intermediate side and the end sides. This paper gives comprehensive review on various techniques that helps to improve the system, analysis of different attack, detection of attack. It focuses on the critical stages of preservation and acquisition of digital evidence from the different source to be used as evidence for aiding investigation.
3 citations
••
[...]
TL;DR: During the three course sequence, students learn forensic tools, procedures, and how to get information from chips removed from cell phone boards.
Abstract: Cell Phone Forensics is a relatively new field when compared to computer forensics. The need to recover data from mobile devices often overwhelms the processing capabilities of most law enforcement agencies. This paper outlines a three course sequence in mobile digital forensics that has been developed in partnership with law enforcement and forensic tool manufacturers. During the three course sequence, students learn forensic tools, procedures, and how get information from chips removed from cell phone boards. This dynamic partnership has been beneficial to all parties and potential employers are seeking graduates with these new forensic skills.
3 citations
••
TL;DR: The process of the forensic investigation of peer-to-peer networks, and the issues relating to obtaining digital evidence from such peer- to- peer networks are examined.
3 citations
••
01 Jan 2012TL;DR: This paper analyzes several recent cases and introduces general regulations governing the collection and the presentation of digital evidence in China, and concludes that stricter technical protocols and standards should be written into the law in China.
Abstract: This paper analyzes several recent cases and introduces general regulations governing the collection and the presentation of digital evidence in China. To ensure the integrity, authenticity, and originality of the obtained digital evidence, the collection and examination of digital evidence requires strict compliance of technical protocols. In any litigation related to digital evidence, forensic experts can play a role in cross-examine the forensic expertise. In judging the reliability of digital evidence, however, in addition to the reliability of scientific principles, should we put more emphasis on the reliability of scientific inference? In conclusion, in order to provide for greater application of digital evidence in fact-finding, the following considerations are important: stricter technical protocols and standards should be written into the law in China; general rules in the evidence law should not be ignored but applied to digital evidence with the emphasis of uniqueness and technicality of digital evidence; and, the judge’s discretion carries a very special meaning.
3 citations
••
TL;DR: An overview of preservation issues, solutions for examiners, and tips for successful preservation of hand-held devices is provided.
Abstract: Cell phones, pagers and other personal digital assistants (PDAs) provide people with the ability to exchange pictures, check email, surf the Web, capture videos, listen to music, or watch movies in the palm of their hand. The future holds even greater promise as these devices may be used as “digital wallets” to pay bills, check account balances, and store other forms of data. In some circumstances, however, a handheld device can become the focus of litigation, investigation, or law enforcement action. At that point, a tool of convenience becomes a source of digital evidence. Digital forensic examiners may be called upon to preserve a wide variety of handheld devices that can produce critical evidence, including email, call logs, pictures, password, videos, user-created documents, and text messages. As PDAs, cell phones, and other handheld devices integrate new technologies for communications and data storage, they will continue to emerge as sources of additional evidence in criminal and civil investigations. Consequently, digital forensic examiners must know how to preserve and acquire data effectively on handheld communication devices. This article provides an overview of preservation issues, solutions for examiners, and tips for successful preservation of hand-held devices.
3 citations