03.03.2013 Views

Issues in Computer Forensics

Issues in Computer Forensics

Issues in Computer Forensics

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

understand the technologies <strong>in</strong>volved <strong>in</strong> trac<strong>in</strong>g and detect<strong>in</strong>g the actions of a specific<br />

computer user. In the above pages, we have given an overview and brief <strong>in</strong>troduction of<br />

each of these important aspects of computer forensics. F<strong>in</strong>ally, it is important to avoid<br />

becom<strong>in</strong>g a crim<strong>in</strong>al by break<strong>in</strong>g the law while <strong>in</strong>vestigat<strong>in</strong>g crim<strong>in</strong>al activities.<br />

Our purpose <strong>in</strong> compil<strong>in</strong>g this paper was to br<strong>in</strong>g together the different<br />

perspectives of computer forensics <strong>in</strong> one place, but it is not meant to be a complete<br />

description of the field. While there is a significant amount of data conta<strong>in</strong>ed <strong>in</strong> the<br />

previous pages, computer forensics is a vast topic, and the advice of an expert should be<br />

sought <strong>in</strong> any serious <strong>in</strong>vestigation. Moreover, computer forensics is a budd<strong>in</strong>g field that<br />

will cont<strong>in</strong>ue to grow, especially as the laws govern<strong>in</strong>g legal cases evolves and computer<br />

technology becomes more ubiquitous.<br />

References<br />

1<br />

Warren G. Kruse II and Jay G. Heiser. <strong>Computer</strong> <strong>Forensics</strong>: Incident Response Essentials. Addison<br />

Wesley, Boston 2001, p. 2.<br />

2 HowStuffWorks.com, “Workplace Surveillance.” [cited May 21, 2003].<br />

http://computer.howstuffworks.com/workplace-surveillance3.htm.<br />

3 Kruse and Heiser, op. cit., p. 3.<br />

4<br />

“Digital Evidence Collect<strong>in</strong>g & Handl<strong>in</strong>g,” March 20, 2002. [cited May 21, 2003].<br />

http://faculty.ncwc.edu/toconnor/495/495lect06.htm<br />

5 Kruse and Heiser, op. cit., p. 15.<br />

6 Ibid., p. 13.<br />

7 Bob Sheldon. “Forensic Analysis of W<strong>in</strong>dows Systems,” from Handbook of <strong>Computer</strong> Crime<br />

Investigation: Forensic Tools and Technology, ed. Eoghan Casey. Academic Press, Bath, England 2002, p.<br />

137-139.<br />

8 Ibid., p. 139-140.<br />

32

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!