Design and Implementation of Windows Based Computer Forensics Management System
نویسندگان
چکیده
Computer management in campus had always been the core task for computer teachers. With the upgrades of computer equipment and network speed, the network traffic showed a higher pattern than before. However, the students’ perception of computer system safety and intellectual property right did not improve accordingly, which resulted in several information safety issues, and the Internet managing employees would receive warning letters frequently. Since most schools in Taiwan adopted MS-Windows as the main operating system, this research developed an integration system for platforms of information safety forensics, with expectation to take use of this sound tool to assist in data collection of forensics-related tasks in campus, and prevent from computer crimes, or even provided forensics evidences for governmental entity. This research took MS-Windows as development platform, to adopt free digital forensics tools to come up with a Chinese localization version of computer forensics management system with automatic data collecting process, and may produce and analyze the image file with Live DVD/USB, to effectively record and manage the relative problems of campus computer usage, and also served as the data source for computer abuse or crime.
منابع مشابه
Design of Computer Integrated Manufacturing System for Irankhodro Auto Industry
Computer-integrated manufacturing (CIM), technologies are presented as solutions to manufacturing organizations, which need to perform well in all customer-related dimensions simultaneously. In the literature, CIM technologies providing such benefits as more frequent production changes, reduced inventory level, improved ability of producing complex parts with a high degree of accuracy and repea...
متن کاملDesign of Computer Integrated Manufacturing System for Irankhodro Auto Industry
Computer-integrated manufacturing (CIM), technologies are presented as solutions to manufacturing organizations, which need to perform well in all customer-related dimensions simultaneously. In the literature, CIM technologies providing such benefits as more frequent production changes, reduced inventory level, improved ability of producing complex parts with a high degree of accuracy and repea...
متن کاملAn Integrated System for Insider Threat Detection
This paper describes a proof-of-concept system for detecting insider threats. The system measures insider behavior by observing a user’s processes and threads, information about user mode and kernel mode time, network interface statistics, etc. The system is built using Microsoft’s Windows Management Instrumentation (WMI) implementation of the Web Based Enterprise Management (WBEM) standards. I...
متن کاملModel Based Design approach for Implementation of PHEV Energy Management
Hardware implementation of the Plug-in hybrid electric vehicles (PHEVs) control strategy is an important stage of the development of the vehicle electric control unit (ECU). This paper introduces Model-Based Design (MBD) approach for implementation of PHEV energy management. Based on this approach, implementation of the control algorithm on an electronic hardware is performed using automatic co...
متن کاملDesign and Implementation of a Kalman Filter-Based Time-Varying Harmonics Analyzer
Nowadays with increasing use of numerous nonlinear loads, voltage and current harmonics in power systems are one of the most important problems power engineers encounter. Many of these nonlinear loads, because of their dynamic natures, inject time-varying harmonics into power system. Common techniques applied for harmonics measurement and assessment such as FFT have significant errors in presen...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2010