A Proactive Approach in Network Forensic Investigation Process

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Proposing a Digital Operational Forensic Investigation Process

The increasing complexity of IT systems can lead to operational failures with disastrous consequences. In order to correct and prevent the recurrence of such failures, a thorough postmortem investigation is required to localise their root causes. However, the currently used troubleshooting approach fails to provide sound analysis of these causes. A promising alternative approach is the emerging...

متن کامل

Mapping Process of Digital Forensic Investigation Framework

Digital forensics is essential for the successful prosecution of digital criminals which involve diverse digital devices such as computer system devices, network devices, mobile devices and storage devices. The digital forensic investigation must be retrieved to obtain the evidence that will be accepted in the court of law. Therefore, for digital forensic investigation to be performed successfu...

متن کامل

network of phonological rules in lori dialect of andimeshk: a study within the framework of post-generative approach.

پژوهش حاضر ارائه ی توصیفی است از نظام آوایی گویش لری شهر اندیمشک، واقع در شمال غربی استان خوزستان. چهارچوب نظری این پژوهش، انگاره ی پسازایشی جزءمستقل می باشد. این پایان نامه شامل موارد زیر است: -توصیف آواهای این گویش به صورت آواشناسی سنتی و در قالب مختصه های زایشی ممیز، همراه با آوانوشته ی تفصیلی؛ -توصیف نظام آوایی گویش لری و قواعد واجی آن در چهارچوب انگاره ی پسازایشی جزءمستقل و معرفی برهم کن...

A Comprehensive and Harmonized Digital Forensic Investigation Process Model.

Performing a digital forensic investigation (DFI) requires a standardized and formalized process. There is currently neither an international standard nor does a global, harmonized DFI process (DFIP) exist. The authors studied existing state-of-the-art DFIP models and concluded that there are significant disparities pertaining to the number of processes, the scope, the hierarchical levels, and ...

متن کامل

A Privacy-Preserving Approach for Collecting Evidence in Forensic Investigation

Capturing digital evidence is crucial for counteracting against computer and cyber crimes. The technique of cloning the whole harddisk (for single PC) for investigation is not feasible in large sharing systems (e.g. in a third-party email server, data center or cloud system). Privay is also a major concern as most of the data in these systems is not relevant to the crime case. The problem is ho...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Computer Applications Technology and Research

سال: 2016

ISSN: 2319-8656

DOI: 10.7753/ijcatr0505.1012