LewinDurgin475

De BISAWiki

Edição feita às 17h34min de 6 de junho de 2012 por LewinDurgin475 (disc | contribs)
(dif) ← Versão anterior | ver versão atual (dif) | Versão posterior → (dif)

Introduction Computer forensics is the practice of collecting, analysing and reporting on digital information in a way which is legally admissible. It is often used at the detection and prevention of crime and in any dispute exactly where evidence is stored digitally. Computer forensics has comparable examination stages to other forensic disciplines and faces identical issues.

About this guide This guide discusses personal computer forensics from a neutral perspective. It is just not linked to specific legislation or intended to promote a particular business or item and is not written in bias of either law enforcement or commercial laptop forensics. It is aimed at a non-technical audience and provides a high-level view of laptop or computer forensics. This guide uses the term "pc", however the suggestions apply to any device capable of storing digital information. Where methodologies have been mentioned they're provided as examples only and do not constitute suggestions or assistance. Copying and publishing the whole or part of this write-up is licensed solely below the terms of the Creative Commons - Attribution Non-Commercial 0 license

Uses of pc forensics There are few locations of crime or dispute exactly where computer system forensics can't be employed. Law enforcement agencies have been among the earliest and heaviest users of computer system forensics and as a result have often been in the forefront of developments in the field. Computers could possibly constitute a 'scene of a crime', for instance with hacking [ 1] or denial of service attacks or they may hold evidence in the type of emails, on line history, documents or other files relevant to crimes which includes murder, kidnap, fraud and drug trafficking. It is just not basically the content material of emails, documents as well as other files which may be of interest to investigators still too the 'meta-data' associated with those files. A pc forensic examination may possibly reveal as soon as a document first appeared on a pc, when it was last edited, once it was last saved or printed and which user carried out these steps.

Guidelines For evidence to be admissible it must be reliable and not prejudicial, meaning that at all stages of this procedure admissibility need to be in the forefront of a computer forensic examiner's mind. One set of ideas which has been widely accepted to assist in this could be the Association of Chief Police Officers Good Practice Guide for Computer Based Electronic Evidence or ACPO Guide for brief. Although the ACPO Guide is aimed at United Kingdom law enforcement its major principles are applicable to all personal computer forensics in whatever legislature. The four most important principles from this guide have been reproduced below (with references to law enforcement removed):

No action ought to change data held on a laptop or storage media which may be for that reason relied upon in court.

In circumstances exactly where an individual finds it necessary to access original information held on a laptop or storage media, that person should be competent to do so and have the ability to give evidence explaining the relevance and also the implications of their actions.