Issues in Computer Forensics
Issues in Computer Forensics
Issues in Computer Forensics
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
understand the technologies <strong>in</strong>volved <strong>in</strong> trac<strong>in</strong>g and detect<strong>in</strong>g the actions of a specific<br />
computer user. In the above pages, we have given an overview and brief <strong>in</strong>troduction of<br />
each of these important aspects of computer forensics. F<strong>in</strong>ally, it is important to avoid<br />
becom<strong>in</strong>g a crim<strong>in</strong>al by break<strong>in</strong>g the law while <strong>in</strong>vestigat<strong>in</strong>g crim<strong>in</strong>al activities.<br />
Our purpose <strong>in</strong> compil<strong>in</strong>g this paper was to br<strong>in</strong>g together the different<br />
perspectives of computer forensics <strong>in</strong> one place, but it is not meant to be a complete<br />
description of the field. While there is a significant amount of data conta<strong>in</strong>ed <strong>in</strong> the<br />
previous pages, computer forensics is a vast topic, and the advice of an expert should be<br />
sought <strong>in</strong> any serious <strong>in</strong>vestigation. Moreover, computer forensics is a budd<strong>in</strong>g field that<br />
will cont<strong>in</strong>ue to grow, especially as the laws govern<strong>in</strong>g legal cases evolves and computer<br />
technology becomes more ubiquitous.<br />
References<br />
1<br />
Warren G. Kruse II and Jay G. Heiser. <strong>Computer</strong> <strong>Forensics</strong>: Incident Response Essentials. Addison<br />
Wesley, Boston 2001, p. 2.<br />
2 HowStuffWorks.com, “Workplace Surveillance.” [cited May 21, 2003].<br />
http://computer.howstuffworks.com/workplace-surveillance3.htm.<br />
3 Kruse and Heiser, op. cit., p. 3.<br />
4<br />
“Digital Evidence Collect<strong>in</strong>g & Handl<strong>in</strong>g,” March 20, 2002. [cited May 21, 2003].<br />
http://faculty.ncwc.edu/toconnor/495/495lect06.htm<br />
5 Kruse and Heiser, op. cit., p. 15.<br />
6 Ibid., p. 13.<br />
7 Bob Sheldon. “Forensic Analysis of W<strong>in</strong>dows Systems,” from Handbook of <strong>Computer</strong> Crime<br />
Investigation: Forensic Tools and Technology, ed. Eoghan Casey. Academic Press, Bath, England 2002, p.<br />
137-139.<br />
8 Ibid., p. 139-140.<br />
32