Research in computer forensics

Approved for public release; distribution is unlimited === Computer Forensics involves the preservation, identification, extraction and documentation of computer evidence stored in the form of magnetically encoded information. With the proliferation of E-commerce initiatives and the increasing crimi...

Full description

Bibliographic Details
Main Author: Wai, Hor Cheong
Other Authors: Warren, Daniel F.
Published: Monterey, California. Naval Postgraduate School 2012
Online Access:http://hdl.handle.net/10945/5910
id ndltd-nps.edu-oai-calhoun.nps.edu-10945-5910
record_format oai_dc
spelling ndltd-nps.edu-oai-calhoun.nps.edu-10945-59102015-02-11T03:55:38Z Research in computer forensics Wai, Hor Cheong Warren, Daniel F. Boger, Dan C. Approved for public release; distribution is unlimited Computer Forensics involves the preservation, identification, extraction and documentation of computer evidence stored in the form of magnetically encoded information. With the proliferation of E-commerce initiatives and the increasing criminal activities on the web, this area of study is catching on in the IT industry and among the law enforcement agencies. The objective of the study is to explore the techniques of computer forensics from the computer security perspective. Specifically, the thesis looks into the application of forensic principles and techniques, security designs of computer hardware and software, and network protocols, in an effort to discover the trails of the computer hackers. The thesis subsequently packages this knowledge into a curriculum for a twelve weeks resident course at the Naval Postgraduate School Complementing the research and course materials are surveys conducted on agencies and vendors currently providing computer forensic courses and training, reading materials, and software tools applicable to computer forensic investigation. The purpose of these surveys is to provide a depository of useful information related to this specialized discipline of computer security. It is the hope of the study that students in the future will benefit from the knowledge gathered in this thesis and the exposure gained from the course and laboratory exercises will allow them to correctly respond to computer intrusions and unauthorized activities they may encounter on their C4I systems. 2012-03-14T17:47:08Z 2012-03-14T17:47:08Z 2002-06 Thesis http://hdl.handle.net/10945/5910 Copyright is reserved by the copyright owner. Monterey, California. Naval Postgraduate School
collection NDLTD
sources NDLTD
description Approved for public release; distribution is unlimited === Computer Forensics involves the preservation, identification, extraction and documentation of computer evidence stored in the form of magnetically encoded information. With the proliferation of E-commerce initiatives and the increasing criminal activities on the web, this area of study is catching on in the IT industry and among the law enforcement agencies. The objective of the study is to explore the techniques of computer forensics from the computer security perspective. Specifically, the thesis looks into the application of forensic principles and techniques, security designs of computer hardware and software, and network protocols, in an effort to discover the trails of the computer hackers. The thesis subsequently packages this knowledge into a curriculum for a twelve weeks resident course at the Naval Postgraduate School Complementing the research and course materials are surveys conducted on agencies and vendors currently providing computer forensic courses and training, reading materials, and software tools applicable to computer forensic investigation. The purpose of these surveys is to provide a depository of useful information related to this specialized discipline of computer security. It is the hope of the study that students in the future will benefit from the knowledge gathered in this thesis and the exposure gained from the course and laboratory exercises will allow them to correctly respond to computer intrusions and unauthorized activities they may encounter on their C4I systems.
author2 Warren, Daniel F.
author_facet Warren, Daniel F.
Wai, Hor Cheong
author Wai, Hor Cheong
spellingShingle Wai, Hor Cheong
Research in computer forensics
author_sort Wai, Hor Cheong
title Research in computer forensics
title_short Research in computer forensics
title_full Research in computer forensics
title_fullStr Research in computer forensics
title_full_unstemmed Research in computer forensics
title_sort research in computer forensics
publisher Monterey, California. Naval Postgraduate School
publishDate 2012
url http://hdl.handle.net/10945/5910
work_keys_str_mv AT waihorcheong researchincomputerforensics
_version_ 1716730521353977856