期刊文献+

论计算机取证相关问题——现场动态分析,获取“易挥发”数字证据 被引量:5

Live Analysis on-Scene to Collect "Volatile Digital Evidence" in Running Computers
下载PDF
导出
摘要 由于目前计算机专业取证人员数量的不足,当前司法实践中对于现场中正处于运行状态的计算机大多采用"二步式"取证的方式来搜集数字证据,即先由侦查人员对涉案计算机实施关机分离和保全,尔后再移交专业机构进行数字证据司法鉴定。这种方式虽然保障了数字证据的原始性和证明力,但无形之中造成了存储在RAM中的"易挥发"数据以及其他形式的潜在数字证据的丢失。而计算机信息系统中的这些"易挥发数据"可以为案件的侦破提供重要线索和潜在的数字证据,因此通过对侦查人员的专业培训,实现"易挥发数据"的现场动态获取和合理保全对数字案件侦查取证意义重大。 Due to lack of computer forensics professionals, the "two-steps" approach is commonly adopted to gather digital evidence in the running computer at the crime scene, that is, unplugging the running computer and booking it into evidence facilities first, then submitting it to trained digital evidence experts for examination. Although this method protects the aboriginality and integrity of digital evidence, it leads to the loss of "volatile data" stored in RAM and in other forms. The "volatile data" can often provide crucial clues and evidence for crime investigation, so it is necessary to make live analysis on-scene to acquire them. It is recommended that investigators be given professional trainings and get the live analysis skill.
作者 王俊
出处 《中国司法鉴定》 2008年第1期26-30,共5页 Chinese Journal of Forensic Sciences
关键词 计算机取证 现场动态分析 易挥发数据 收集 computer forensics live analysis on-scene volatile data collection
  • 相关文献

参考文献10

  • 1Carrier B.File System Forensic Analysis[]..2005
  • 2Carvey H.Windows Forensics and Incident Recovery[]..2004
  • 3Garner K.Forensic Acquisition Utilities[]..2004
  • 4Jones K.Real Digital Forensics:Computer Security and Inci-dent Response[]..2005
  • 5Nolan R.First Responders Guide to Computer Forensics,CERT Training and Education Handbook CMU/SEI-2005-HB-001[]..2005
  • 6Remote-exploit.org.Auditor Security Collection CDROM[]..
  • 7Kenneally E,Brown C.Risk Sensitive Digital Evidence Col-lection[].Digital Investigation.2005
  • 8.
  • 9.
  • 10.

同被引文献26

  • 1程杰仁,殷建平,刘运,钟经伟.蜜罐及蜜网技术研究进展[J].计算机研究与发展,2008,45(z1):375-378. 被引量:35
  • 2于波,涂敏.计算机取证分析[J].计算机与现代化,2006(12):4-6. 被引量:10
  • 3张有东,王建东,朱梧槚.反计算机取证技术研究[J].河海大学学报(自然科学版),2007,35(1):104-107. 被引量:13
  • 4Kevin Mandia, Chris Prosise, Matt Pepe.应急响应&计算机司法鉴定(第2版)[M].汪清清,付宇光,等译.北京:清华大学出版社,2004.
  • 5高铭喧.新编中国刑法学[M].北京:中国人民大学出版社,1998.
  • 6Carrier B. File System Forensic Analysis [ M ]. Boston, MA : Addison-Wesley Professional,2005.
  • 7Carvey H. Windows Forensics and Incident Recovery [ M ]. Boston, MA : Addison-Wesley Professional ,2004.
  • 8戴士剑.计算机取证技术体系研究[C]//第二届中国计算机取证技术峰会.2006.
  • 9Nolan R. First Responders Guide to Computer Forensics, CERT Training and Education Handbook [ M ]. Pittsburgh, PA: Carnegie-Mellon Software Engineering lnstiute,2005.
  • 10Scott Ferguson, Keith Gittings, Casey Lunny. A Forensic Evaluation of AN NT System [ EB/OL]. http://users. cs. jmu. edu/…/NT-Forensics-by-Gittings-Keith-Lunny-Casty- & -Ferguson-Scott-2002-Fall. doc ,2002-01-01.

引证文献5

二级引证文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部