期刊文献+

电子取证技术体系研究 被引量:7

Study of system about digital Forensics Technology
原文传递
导出
摘要 随着涉及电子证据的犯罪案件如雨后春笋般涌现,电子取证的价值凸显,但是对电子证据的认识还不清晰、不统一。电子取证是一门实践性、法律性非常强的学科,其体系的发展依赖于众多计算机基础应用技术的不断进步,同时必须满足法律制度本身的要求,相关的取证工作要能够应对各种复杂的案件情况。本文仔细梳理了电子取证技术体系的层次结构,对电子证据的取证从整体上进行了探索,并详细分析了电子取证的各要素。 With the emergence of a large number of criminal cases involving digital evidence, its value rising, but the understanding of digital evidence is not clear, not uniform, digital forensic is a very strong discipline closed to legal practice, the development of its system depends on many applications of computer at the same time must meet the requirements of legal system itself, and be able to deal with all kinds of complicated case. This paper combed through the hierarchical structure of digital forensics technology, to collect evidence is explored on the whole, and a detailed analysis of the various elements of electronic evidence.
出处 《网络安全技术与应用》 2013年第5期8-10,13,共4页 Network Security Technology & Application
关键词 电子证据 电子取证 计算机犯罪 动态取证 digital evidence technology system framework dynamic forensics
  • 相关文献

参考文献3

二级参考文献1

  • 1杨永川,蒋平,黄淑华.计算机犯罪侦查[M].北京:清华大学出版社.2007.

共引文献4

同被引文献27

  • 1丁丽萍,王永吉.计算机取证的相关法律技术问题研究[J].软件学报,2005,16(2):260-275. 被引量:84
  • 2Farmer D, Venema W. Computer forensics analysis class handouts [ EB/OL]. http://www, fish. com/ forensics/class, html. 2014.
  • 3Kevin Mandia, Chris Prosise & Matt Pepe. Incident response & computer forensics second edition[ M ] Osborne/McGraw-Hill, 2003.
  • 4U.S. Department of justice office of justice programs, electronic crime scene investigation: a guide for first responders [ EB/OL ]. https ://www. ncjrs, gov/pdffilesl/nij/187736, pdf. 2014.
  • 5International organization on digital evidence (IOCE). digital evidence: standards and principles [ EB/OL]. http ://www. fbi. gov/about-us/lab/forensic-science-communications/fsc/april2OOO/swgde. htm. 2014.
  • 6Lance spitzner honeypots : catching the insider threat [ EB/OL ]. http ://craigchamberlain. com/library/ insider/Honeypots% 20-% 20% 20Catching% 20the% 20Insider% 20Threat. pdf. 2014.
  • 7Gutmann P. Secure deletion of data from magnetic and solid-state memory, in proceedings of the 6th USENIX Security Symposium. San Jose, California: USENIX, 1996. 77-90[ EB/OL]. https://www usenix, org/legacy/publications/library/proceedings/sec96/full_papers/gutmann/. 2014.
  • 8李俊莉.司法鉴定中电子取证措施[J].安阳师范学院学报,2008(4):24-26. 被引量:3
  • 9陈璟,陈平华,李文亮.Android内核分析[J].现代计算机,2009,15(11):112-115. 被引量:72
  • 10宋杰,党李成,郭振朝,赵萌.Android OS手机平台的安全机制分析和应用研究[J].计算机技术与发展,2010,20(6):152-155. 被引量:69

引证文献7

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部