Computer Forensics: An Overview

K.V.N. Rajesh*, K.V.N. Ramesh**
* HOD, Department of Information Technology, Vignan’s Institute of Information Technology, Visakhapatnam, India.
** Project Manager, Tech Mahindra, Visakhapatnam, India.
Periodicity:April - June'2016
DOI : https://doi.org/10.26634/jse.10.4.6056

Abstract

Computer Forensics involves identification of computer crimes and finding solutions for them by using analytical and investigative techniques. These analytical and investigative techniques involve the acquisition, analysis and documentation of computer data related to crimes. This paper describes the computer forensics, security issues in computer and network, types of computer crimes, examples of computer crimes, tools of computer forensics, cyber laws, courses and career in computer forensics.

Keywords

Computer Forensics, Digital Forensics, Forensic Science.

How to Cite this Article?

Rajesh, K. V. N., and Ramesh, K. V. N. (2016). Computer Forensics: An Overview. i-manager’s Journal on Software Engineering, 10(4), 1-5. https://doi.org/10.26634/jse.10.4.6056

References

[1]. Prosise, C., Mandia, K., and Pepe, M. (2003). Incident Response & Computer Forensics. (p.11). McGraw- Hill/Osborne.
[2]. Schneier, B., and Kelsey, J. (1999). “Secure audit logs to support Computer Forensics”. ACM Transactions on Information and System Security (TISSEC), Vol. 2, No. 2, pp. 159-176.
[3]. Vacca, J. R. (2005). Computer Forensics: Computer Crime Scene Investigation (Networking Series). Charles River Media, Inc.
[4]. Kruse II, W. G., and Heiser, J. G. (2001). Computer Forensics: Incident Response Essentials. Pearson Education.
[5]. Marcella Jr, A., and Greenfield, R. S. (Eds.), (2002). Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes. CRC Press.
[6]. Rogers, M. K., and Seigfried, K. (2004). “The Future of Computer Forensics: a Needs Analysis Survey ”. Computers & Security, Vol. 23, No. 1, pp. 12-16.
[7]. Yasinsac, A., Erbacher, R. F., Marks, D. G., Pollitt, M. M., and Sommer, P. M. (2003). “Computer Forensics Education”. IEEE Security & Privacy, Vol. 4, pp. 15-23.
[8]. Rogers, M. K., Goldman, J., Mislan, R., Wedge, T., and Debrota, S. (2006). “Computer Forensics Field Triage Process Model”. In Proceedings of the Conference on Digital Forensics, Security and Law (p. 27). Association of Digital Forensics, Security and Law.
[9]. Nelson, B., Phillips, A., and Steuart, C. (2015). Guide to Computer Forensics and Investigations. Cengage Learning.
[10]. Caloyannides, M. A. (2001). Computer Forensics and Privacy. Artech House Publishers.
[11]. Meyers, M., and Rogers, M. (2004). “Computer Forensics: The Need for Standardization and Certification”. International Journal of Digital Evidence, Vol. 3, No. 2, pp. 1- 11.
[12]. Yasinsac, A., and Manzano, Y. (2001). “Policies to Enhance Computer and Network Forensics”. In Proceedings of the 2001 IEEE Workshop on Information Assurance and Security, pp. 289-295.
[13]. Vacca, J. R. (2002). Computer Forensics: Computer Crime Scene Investigation. Charles River Media, Inc.
[14]. Rogers, M. (2003). The Role of Criminal Profiling in the Computer Forensics Process. Computers & Security, Vol. 22, No. 4, pp. 292-298.
[15]. Fahey, A. L. (2008). Computer Forensics, E-Discovery and Incident Response Methods and Systems. U.S. Patent Application No. 12/318,083.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.