Abstract
This chapter introduces the concept of cyber forensics, digital evidence, and computer forensic process. Cyber forensics is defined as the application of computer science to laws — to process and analyze digital evidence, to reconstruct a crime, and to provide links among the offender, the victim and the crime scene. Basically Digital evidence includes all digital data, which can be used to establish that a crime has been committed or can provide a link between a crime and its victim or a crime and its perpetrator. The forensic process of digital evidences includes evidence recognition, collection, preservation, and analysis for crime reconstruction.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
J. Marcella and R. S. Greenfield. Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes, Auerbach Publications, 2002.
R. Saferstein, Criminalistics — An introduction to Forensic Science, 2nd edition, Prentice Hall, 1981.
S. F. Galton, Personal Identification and Description — I, Nature, 1888.
R. Saferstein, Criminalistics — An introduction to Forensic Science, 6th edition, Prentice Hall, 1998.
K. Graham, J. R. Evidence, CASENOTE Law Outlines, 2000.
E. Casey, Digital Evidence and Computer Crime: Forensic Science, Computers and the Internet, Academic Press, 2000.
W. G. Kruse II and J. G. Heiser, Computer Forensics: Incident Response Essentials, Addison-Wesley, 2002.
H. C. Lee, Crime Scene Investigation, Central Police University Press, Taoyuan, Taiwan, ROC.
US Department of Justice. Federal Guidelines for Searching and Seizing Computers, [http://www.usdoj.gov/criminal/cybercrime/search_docs/toc.htm], 1994.
D. Icove, K. Seger, and W. VonStorch, Computer Crime — A Crimefighter’s Handbook, O’Reilly & Associates, 1995.
W. Venema, Strangers in the Night, Dr. Dobb ’s Journal, [http://www.ddj.com/documents/s=879/ddj001lg/001 lg.htm], November, 2000.
A. Silberschatz, P. B. Galvin, and G. Gagne, Operating System Concepts, John Wiley & sons, 6th ed, 2003.
W. Venema, File Recovery Techniques, Dr. Dobb’s Journal, [http://www.ddj.com/ documents/s=878/ddj0012h/0012h.htm], December, 2000.
D. Farmer and W. Venema, Forensic Computer Analysis: An Introduction. Dr. Dobb’s Journal, September, 2000.
P. Gutmann, Secure Deletion of Data from Magnetic and Solid-State Memory. Proceedings of the Sixth USENIX Security Symposium, San Jose, California, July 22–25, 1996.
S. L. Garfinkel and A. Shelat, Remembrance of Data Passed — A Study of Disk Sanitization Practices, IEEE Security & Privacy, Vol. No. 1, 2003.
G. L. Kovacich, and W. C. Boni, High-Technology Crime Investigator’s Handbook, Butterworth Heinemann, 2000.
A. S. Tanenbaum, Computer Networks, 2nd ed., Prentice Hall, 1988.
E. Casey, Handbook of Computer Crime Investigation, Academic Press, 2002.
K. Mandia and C. Prostise, Incident Response; Investigating Computer Crime, Osborne/McGraw-Hill, 2001.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer Science+Business Media, Inc.
About this chapter
Cite this chapter
Wang, JH. (2005). Cyber Forensics: Issues and Approaches. In: Kumar, V., Srivastava, J., Lazarevic, A. (eds) Managing Cyber Threats. Massive Computing, vol 5. Springer, Boston, MA. https://doi.org/10.1007/0-387-24230-9_13
Download citation
DOI: https://doi.org/10.1007/0-387-24230-9_13
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-24226-2
Online ISBN: 978-0-387-24230-9
eBook Packages: Computer ScienceComputer Science (R0)