Research in computer forensics

Approved for public release; distribution is unlimited === Computer Forensics involves the preservation, identification, extraction and documentation of computer evidence stored in the form of magnetically encoded information. With the proliferation of E-commerce initiatives and the increasing crimi...

Full description

Bibliographic Details
Main Author: Wai, Hor Cheong
Other Authors: Warren, Daniel F.
Published: Monterey, California. Naval Postgraduate School 2012
Online Access:http://hdl.handle.net/10945/5910
Description
Summary:Approved for public release; distribution is unlimited === Computer Forensics involves the preservation, identification, extraction and documentation of computer evidence stored in the form of magnetically encoded information. With the proliferation of E-commerce initiatives and the increasing criminal activities on the web, this area of study is catching on in the IT industry and among the law enforcement agencies. The objective of the study is to explore the techniques of computer forensics from the computer security perspective. Specifically, the thesis looks into the application of forensic principles and techniques, security designs of computer hardware and software, and network protocols, in an effort to discover the trails of the computer hackers. The thesis subsequently packages this knowledge into a curriculum for a twelve weeks resident course at the Naval Postgraduate School Complementing the research and course materials are surveys conducted on agencies and vendors currently providing computer forensic courses and training, reading materials, and software tools applicable to computer forensic investigation. The purpose of these surveys is to provide a depository of useful information related to this specialized discipline of computer security. It is the hope of the study that students in the future will benefit from the knowledge gathered in this thesis and the exposure gained from the course and laboratory exercises will allow them to correctly respond to computer intrusions and unauthorized activities they may encounter on their C4I systems.