Computer Forensics Procedures and Methods
J. Philip Craiger, National Center for Forensic Science and University of Central Florida
Sound Computer Forensic Practice
Arriving at the Scene: Initial Response
I Know What You Did with Your Computer Last Summer...
Behavioral Time Lines: What Happened and When?
Collecting Evidence from Live Systems
Reducing the Potential for Evidence Contamination
INTRODUCTION
Computer forensics involves the preservation, identification, extraction, and documentation of computer evidence stored in the form of magnetically, optically, or electronically stored media. It is a relatively new science that is becoming increasingly important as criminals aggressively expand the use of technology in their enterprise of illegal activities. Computer forensic techniques are not as advanced as those of the more mature and mainstream forensics techniques used by law enforcement, such as blood typing, ballistics, fingerprinting, and DNA testing. Its immaturity is partly attributable to fast-paced changes in computer technology and the fact that it is a multidisciplinary ...
Get Handbook of Information Security: Information Warfare, Social, Legal, and International Issues and Security Foundations, Volume 2 now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.