期刊文献+

浅谈计算机取证技术 被引量:2

Simple Discussion of Computer Forensics
下载PDF
导出
摘要 随着计算机与网络逐渐成为社会、政治、经济、文化生活的重要组成部分,在计算机与网络带来快捷办公、便捷沟通等便利的同时.利用其犯罪的现象日益突出。作为打击此项犯罪重要手段的计算机取证技术,成为目前计算机和法学界共同关注和研究的重点。该文首先简述了计算机取证技术的定义和实质。通过对比分析国内外研究历史及现状、总结常用取证模型,提出取证中潜在的问题。展望了取证技术的发展方向。 With computer and network becoming the more important role in social, political, economy and cultural areas as weU as bringing the high-effcient work and high-speed communication, crime phenomenon of it are also increasing day by day. Being an important means of anti-crime and defeat-crime, CF raised hot topics in fields of computer science and science of law. An introduction of Computer Forensics and its substances are made in the paper first. By comparing the research history and actual state of CF home and broad and summarizing frequently-used models of CF, the potential problems of CF's are submitted, an outlook of CF's development direction have been made in the last part of the article and also.
作者 刘文俭 LIU Wen-jian (Computer Department of SICHUAN Normal University, Chengdu 610101, China)
出处 《电脑知识与技术》 2010年第10期7939-7941,共3页 Computer Knowledge and Technology
关键词 计算机和网络犯罪 计算机取证技术 相关理论 潜在问题 展望发展方向 crime of computer and cyber computer ,forensics related-theory potential problems oudook of development
  • 相关文献

参考文献7

二级参考文献28

  • 1grugq.Defeating forensic analysis on Unix. Phrack #59 article6.http://www.phrack.org/show.phpp=59a=6,2002.
  • 2Farmer D.What are MACtimes Dr. Dobb''s Journal.http://www.ddj.com/documents/s=880/ddj0010f/0010f.htm,2000,10.
  • 3Farmer D Venema W.The coroner''''s toolkit (TCT). Dan Farmer Wietse Venema.http://www.fish.com/tct/,2002.
  • 4grugq scut.Armouring the ELF: Binary encryption on the UNIX platform. Phrack #58 article5.http://www.phrack.org/show.phpp=58a=5,2001.
  • 5Oseles L.Computer forensics: The key to solving the crime.http://facuity.ed.umuc.edu/-meinkej/inss690/oseles_2.pdf,2001.
  • 6ParraM.Computer forensics.http://www.giac.org/practical/Moroni_Parra_GSEC.doc,2002.
  • 7Dittrich D.Basic steps in forensic analysis of Unix systems.http://staff.washington.edu/dittrich/misc/forensics/,2000.
  • 8CNNIC.中国互联网络发展状况统计报告[EB/OL].http://www.cnnic.net.cn/download/2005/2005011801.pdf,2005-02-01/2005-03-19.
  • 9YASINSAC. Computer forensics education[J]. IEEE Security & Privacy Magazine, 2003,1(4):15-23.
  • 10KEVINMandia CHRISProsise 常晓波译.应急响应:计算机犯罪调查[M].北京:清华大学出版社,2002..

共引文献226

同被引文献8

引证文献2

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部