期刊文献+

计算机取证综述 被引量:7

A Review of Computer Forensics
下载PDF
导出
摘要 计算机取证就是利用计算机技术,按照合法的程序与规范对计算机犯罪证据进行发现、固定、提取、分析和表达的过程。在计算机证据搜集的过程中应遵循合法性原则、及时性原则、安全性原则、以易失程度为序原则。虽然计算机取证技术和工具等已取得一定的成果,但为了能让计算机取证工作向着更好的方向发展,制定取证工具的评价标准、取证机构和从业人员的资质审核办法以及取证工作的操作规范是非常必要的。 Computer forensics is to make use of computer science to discover, fix, withdraw, and analyz computer crime evidence. Collecting computer crime evidence should follow a legitimacy principle, time principle, safety principle and take losing degree easily as a preface principle. Although Computer technique and tool have made some achievement, the evaluation standard of computer forensics tools, the certification of computer forensics organization and staff, the operation norm for computer forensics is necessary.
作者 于淼 孙睿
出处 《北京联合大学学报》 CAS 2007年第2期49-53,共5页 Journal of Beijing Union University
关键词 计算机取证 计算机证据 计算机犯罪 安全意识 取证工具 computer forensics digital evidence computer crime security consciousness forensics tools
  • 相关文献

参考文献9

二级参考文献22

  • 1grugq.Defeating forensic analysis on Unix. Phrack #59 article6.http://www.phrack.org/show.phpp=59a=6,2002.
  • 2Farmer D.What are MACtimes Dr. Dobb''s Journal.http://www.ddj.com/documents/s=880/ddj0010f/0010f.htm,2000,10.
  • 3Farmer D Venema W.The coroner''''s toolkit (TCT). Dan Farmer Wietse Venema.http://www.fish.com/tct/,2002.
  • 4grugq scut.Armouring the ELF: Binary encryption on the UNIX platform. Phrack #58 article5.http://www.phrack.org/show.phpp=58a=5,2001.
  • 5Oseles L.Computer forensics: The key to solving the crime.http://facuity.ed.umuc.edu/-meinkej/inss690/oseles_2.pdf,2001.
  • 6ParraM.Computer forensics.http://www.giac.org/practical/Moroni_Parra_GSEC.doc,2002.
  • 7Dittrich D.Basic steps in forensic analysis of Unix systems.http://staff.washington.edu/dittrich/misc/forensics/,2000.
  • 8熊华、郭世泽等,网络安全-取证与蜜罐,人民邮电出版社,2003年.97-136.
  • 9[1]Lunn D A.Computer Forensics:An Overview.http:∥www.sans.org/infosecFAQ/incident/forensics.htm
  • 10[2]CERT R Coordination Center Steps for Recovering from a Unix or NT System Compromise.http:∥www.cert.org/tech tips/root compromise.html

共引文献285

同被引文献21

引证文献7

二级引证文献23

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部