...
首页> 外文期刊>Information Systems Security >Computer Forensic Case Study: Espionage, Part 1 Just Finding the File is Not Enough!
【24h】

Computer Forensic Case Study: Espionage, Part 1 Just Finding the File is Not Enough!

机译:计算机取证案例研究:间谍活动,第1部分仅找到文件还不够!

获取原文
获取原文并翻译 | 示例
           

摘要

How critical is it for the computer crime investigator to show the operating capabilities of a suspect's computer or to prove how a specific file or document was used? Consider the following scenario for a newly trained computer forensic analyst: Having recently been trained in computer forensics and practicing your file recovery techniques for co-workers, you begin an investigation for a client where you can use all those hard-learned skills. You make an image of the suspect's drive, look for the incriminating document, and eureka! You find it, recently deleted,but easy to recover. You undelete the file (maybe feel a little guilty because it was so easy), announce your success, and write up the results for your case file. It may be a child porn picture, or a document with industrial secrets, but when you appear in court later, you lose the case because you haven't proven that the suspect's system was even capable of viewing the picture or editing or printing the document.
机译:对于计算机犯罪调查人员而言,显示犯罪嫌疑人计算机的运行能力或证明如何使用特定文件或文档有多重要?对于新训练的计算机取证分析师,请考虑以下情形:最近接受了计算机取证方面的培训,并为同事练习了文件恢复技术,然后开始为客户进行调查,在这里可以使用所有这些刻板的技能。您为犯罪嫌疑人的驱动器制作了图像,查找了有罪的文件,然后找到了尤里卡!您找到它,最近删除了,但是很容易恢复。您取消删除该文件(因为它很简单,可能会感到内gui),宣布您的成功,并为您的案例文件写下结果。它可能是儿童色情图片,或者是具有工业机密的文件,但是当您稍后出庭时,您败诉了,因为您还没有证明犯罪嫌疑人的系统甚至能够查看图片或编辑或打印该文件。 。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号