WaltzTarr320

מתוך The Phnomenologic Cage
קפיצה אל: ניווט, חיפוש

Introduction Computer forensics may be the practice of collecting, analysing and reporting on digital information in a way that's legally admissible. It is usually utilised in the detection and prevention of crime and in any dispute exactly where evidence is stored digitally. Computer forensics has similar examination stages to other forensic disciplines and faces same concerns.

About this guide This guide discusses personal computer forensics from a neutral perspective. It just isn't linked to particular legislation or intended to promote a particular small business or item and just isn't written in bias of either law enforcement or commercial computer system forensics. It is aimed at a non-technical audience and provides a high-level view of computer system forensics. This guide uses the term "computer system", nevertheless the ideas apply to any device capable of storing digital information. Where methodologies have been mentioned they are supplied as examples only and do not constitute suggestions or guidance. Copying and publishing the entire or component of this article is licensed solely under the terms of the Creative Commons - Attribution Non-Commercial 0 license

Uses of personal computer forensics There are couple of locations of crime or dispute exactly where pc forensics cannot be utilized. Law enforcement agencies have been amongst the earliest and heaviest users of pc forensics and consequently have normally been at the forefront of developments in the field. Computers may perhaps constitute a 'scene of a crime', as an example with hacking [ one] or denial of service attacks or they may perhaps hold evidence at the type of emails, on the web history, documents or other files relevant to crimes including murder, kidnap, fraud and drug trafficking. It is just not basically the content of emails, documents and other files which could be of interest to investigators yet at the same time the 'meta-data' related with those files. A laptop or computer forensic examination could possibly reveal as soon as a document very first appeared on a computer, when it was last edited, as soon as it was last saved or printed and which user done these actions.

Guidelines For evidence to be admissible it must be dependable and not prejudicial, meaning that at all stages of this procedure admissibility need to be at the forefront of a laptop or computer forensic examiner's mind. One set of recommendations which has been widely accepted to help in this will be the Association of Chief Police Officers Good Practice Guide for Computer Based Electronic Evidence or ACPO Guide for short. Although the ACPO Guide is aimed at United Kingdom law enforcement its key principles are applicable to all laptop or computer forensics in whatever legislature. The 4 principal principles from this guide have been reproduced below (with references to law enforcement removed):

No action have to alter data held on a computer or storage media which might be subsequently relied upon in court.

In cases where a person finds it crucial to access original data held on a computer system or storage media, that individual must be competent to do so and have the ability to offer evidence explaining the relevance plus the implications of their steps.

כלים אישיים
גרסאות שפה
מרחבי שם
פעולות
ניווט
תיבת כלים