Skip to main content

Cyber Forensics: Issues and Approaches

  • Chapter
Managing Cyber Threats

Part of the book series: Massive Computing ((MACO,volume 5))

  • 1975 Accesses

Abstract

This chapter introduces the concept of cyber forensics, digital evidence, and computer forensic process. Cyber forensics is defined as the application of computer science to laws — to process and analyze digital evidence, to reconstruct a crime, and to provide links among the offender, the victim and the crime scene. Basically Digital evidence includes all digital data, which can be used to establish that a crime has been committed or can provide a link between a crime and its victim or a crime and its perpetrator. The forensic process of digital evidences includes evidence recognition, collection, preservation, and analysis for crime reconstruction.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. J. Marcella and R. S. Greenfield. Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes, Auerbach Publications, 2002.

    Google Scholar 

  2. R. Saferstein, Criminalistics — An introduction to Forensic Science, 2nd edition, Prentice Hall, 1981.

    Google Scholar 

  3. S. F. Galton, Personal Identification and Description — I, Nature, 1888.

    Google Scholar 

  4. R. Saferstein, Criminalistics — An introduction to Forensic Science, 6th edition, Prentice Hall, 1998.

    Google Scholar 

  5. K. Graham, J. R. Evidence, CASENOTE Law Outlines, 2000.

    Google Scholar 

  6. E. Casey, Digital Evidence and Computer Crime: Forensic Science, Computers and the Internet, Academic Press, 2000.

    Google Scholar 

  7. W. G. Kruse II and J. G. Heiser, Computer Forensics: Incident Response Essentials, Addison-Wesley, 2002.

    Google Scholar 

  8. H. C. Lee, Crime Scene Investigation, Central Police University Press, Taoyuan, Taiwan, ROC.

    Google Scholar 

  9. US Department of Justice. Federal Guidelines for Searching and Seizing Computers, [http://www.usdoj.gov/criminal/cybercrime/search_docs/toc.htm], 1994.

    Google Scholar 

  10. D. Icove, K. Seger, and W. VonStorch, Computer Crime — A Crimefighter’s Handbook, O’Reilly & Associates, 1995.

    Google Scholar 

  11. W. Venema, Strangers in the Night, Dr. Dobb ’s Journal, [http://www.ddj.com/documents/s=879/ddj001lg/001 lg.htm], November, 2000.

    Google Scholar 

  12. A. Silberschatz, P. B. Galvin, and G. Gagne, Operating System Concepts, John Wiley & sons, 6th ed, 2003.

    Google Scholar 

  13. W. Venema, File Recovery Techniques, Dr. Dobb’s Journal, [http://www.ddj.com/ documents/s=878/ddj0012h/0012h.htm], December, 2000.

    Google Scholar 

  14. D. Farmer and W. Venema, Forensic Computer Analysis: An Introduction. Dr. Dobb’s Journal, September, 2000.

    Google Scholar 

  15. P. Gutmann, Secure Deletion of Data from Magnetic and Solid-State Memory. Proceedings of the Sixth USENIX Security Symposium, San Jose, California, July 22–25, 1996.

    Google Scholar 

  16. S. L. Garfinkel and A. Shelat, Remembrance of Data Passed — A Study of Disk Sanitization Practices, IEEE Security & Privacy, Vol. No. 1, 2003.

    Google Scholar 

  17. G. L. Kovacich, and W. C. Boni, High-Technology Crime Investigator’s Handbook, Butterworth Heinemann, 2000.

    Google Scholar 

  18. A. S. Tanenbaum, Computer Networks, 2nd ed., Prentice Hall, 1988.

    Google Scholar 

  19. E. Casey, Handbook of Computer Crime Investigation, Academic Press, 2002.

    Google Scholar 

  20. K. Mandia and C. Prostise, Incident Response; Investigating Computer Crime, Osborne/McGraw-Hill, 2001.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer Science+Business Media, Inc.

About this chapter

Cite this chapter

Wang, JH. (2005). Cyber Forensics: Issues and Approaches. In: Kumar, V., Srivastava, J., Lazarevic, A. (eds) Managing Cyber Threats. Massive Computing, vol 5. Springer, Boston, MA. https://doi.org/10.1007/0-387-24230-9_13

Download citation

  • DOI: https://doi.org/10.1007/0-387-24230-9_13

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-0-387-24226-2

  • Online ISBN: 978-0-387-24230-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics