Home   >   CSC-OpenAccess Library   >    Manuscript Information
Full Text Available

(166.38KB)
This is an Open Access publication published under CSC-OpenAccess Policy.
Techniques in Computer Forensics: A Recovery Perspective
Bhanu Prakash Battula, KeziaRani , Satya Prasad , T. Sudha
Pages - 27 - 35     |    Revised - 05-05-2009     |    Published - 18-05-2009
Volume - 3   Issue - 2    |    Publication Date - April 2009  Table of Contents
MORE INFORMATION
KEYWORDS
Computer Forensics, Fraud, Disks
ABSTRACT
Computer forensics has recently gained significant popularity with many local law enforcement agencies. It is currently employed in fraud, theft, drug enforcement and almost every other enforcement activity. The research paper includes the types of attempts to destroy or tamper the files by the culprits and unleashes various recovery techniques, and their significance in different situations from those attempts, which destroy files or inflict physical damage to the computer. The paper also presents the nature and immediate need of enhancing the existing automated forensics tools. The paper gives a quick glance of various methods used by culprits to destroy the information in the electronic storage media and their corresponding forensic approach done by the computer forensic experts in the perspective of recovery.
CITED BY (6)  
1 Bhosale, D. V., Mitkal, P. K., Pawar, R. N., & Paranjape, R. S. (2016). Review on Computer Forensic. Training, 2(01).
2 Çakir, H., & Kiliç, M. S. (2016). The keyword search method and its importance in computer forensics Adli bilisimde anahtar kelime aramasi metodu ve önemi. Journal of Human Sciences, 13(1), 2368-2384.
3 Velakanti, G., & Katuri, A. (2014). Enhancement of Existing Tools and Techniques for Computer Forensic Investigation. International Journal of Computer Science and Network Security (IJCSNS), 14(12), 74.
4 Bryant, M. S., & Bryant, R. (Eds.). (2014). Policing Digital Crime. Ashgate Publishing, Ltd..
5 Khoury, I., & Caushaj, E.computer forensic.
6 Andrade, M., & Ferreira, M. A. M. (2009). Criminal and civil identification with DNA databases using Bayesian networks. International Journal of Security, 3(4), 65-74.
1 Google Scholar
2 ScientificCommons
3 Academic Index
4 CiteSeerX
5 refSeek
6 iSEEK
7 Socol@r
8 ResearchGATE
9 Bielefeld Academic Search Engine (BASE)
10 Scribd
11 WorldCat
12 slideshare
13 PDFCAST
14 PdfSR
15 Free-Books-Online
1 www.porcupine.org/forensics/tct.html
2 www.forensicswiki.org/wiki/ILook
3 www.sleuthkit.org/
4 www.accessdata.com
5 http://www.digitalintelligence.com/software/disoftware/drivespy/
6 http://en.wikipedia.org/wiki/EnCase.
7 http://www.x-ways.net/forensics/index-m.html.
8 David Icove, Karl Seqer, William Von Storch, “Computer crime: A Crime-figher’s Handbook”,
9 David Icove, Karl Seqer, William Von Storch, “Computer crime: A Crime-figher’s Handbook”, O'Reilly Media, Inc, USA (1 Aug 1995).
10 Wofle, Henry B, Computers and Security, El sevier Science, Ltd, pp. 26-28.
11 http://www.forensics.com
12 Thomas Rude CISSP, “Evidence Seizure Methodology for Computer Forensics”.
13 http://www.computerforensics.net/forensics.htm
14 Nelson, Bill, Philips, Amelia, Enfinger, Frank and Stewart, Chris, “Guide to Computer Forensics and Investigations”, Thomson, Cousre Technology, Boston, 2004.
15 Anthony Verducci, “How to Absolutely, Positively Destroy Your Data”: DIY Tech, February 2007.
16 Michele C. S. Lange, Kristin M. Nimsger, ‘’Electronic evidence and discovery’’, American Bar Association, 2004.
17 Dinan, Thomas Edward, Robertson, Neil Leslie, Tam, Alan Jun-yuan, “Magnetic head for hard disk drive having varied composition nickel-iron alloy magnetic poles”, U.S. Patent No. 6,912,771. July 5, 2005.
18 Andrew S.Tanenbaum, “Modern Operating Systems” Prentice Hall, Dec. 2007
19 Guy Hart-Davis,”Windows(R) XP Professional: The Complete Reference” McGraw-Hill Osborne, Dec. 2002.
20 Peterson, Siberschaz, Galvin, “Secondary Storage Structure, Advanced Operating
21 Charles H Sobey, “Recovering unrecoverable data”, Channel Science white paper, 14th April 2004.
22 S.Berinato, “Good Stuff Cheap”, CIO, 15 Oct.2002 pp 53-59.
23 M. Villano, “Hard-Drive Magic: Making Data Disappear Forever”, New York
24 Simson L. Garfinkel and Abhi Shelat, “Remembrance of Data Passed: A Study of Disk Sanitization Practices”, IEEE Security & Privacy, Vol. 1, 2003, pp. 17-27.
25 G.Shpantzer and T.Ipsen, “Law Enforcement Challenges in Digital Forensics.” Proc.
26 Thomas Welch, “Handbook of information Security Management”, CRC Press LLC,
27 Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal
Mr. Bhanu Prakash Battula
- India
Mr. KeziaRani
- India
Mr. Satya Prasad
- India
Mr. T. Sudha
- India
thatimakula_sudha@yahoo.com