Home   >   CSC-OpenAccess Library   >    Manuscript Information
Full Text Available

This is an Open Access publication published under CSC-OpenAccess Policy.
Techniques in Computer Forensics: A Recovery Perspective
Bhanu Prakash Battula, KeziaRani , Satya Prasad , T. Sudha
Pages - 27 - 35     |    Revised - 05-05-2009     |    Published - 18-05-2009
Volume - 3   Issue - 2    |    Publication Date - April 2009  Table of Contents
Computer Forensics, Fraud, Disks
Computer forensics has recently gained significant popularity with many local law enforcement agencies. It is currently employed in fraud, theft, drug enforcement and almost every other enforcement activity. The research paper includes the types of attempts to destroy or tamper the files by the culprits and unleashes various recovery techniques, and their significance in different situations from those attempts, which destroy files or inflict physical damage to the computer. The paper also presents the nature and immediate need of enhancing the existing automated forensics tools. The paper gives a quick glance of various methods used by culprits to destroy the information in the electronic storage media and their corresponding forensic approach done by the computer forensic experts in the perspective of recovery.
CITED BY (6)  
1 Bhosale, D. V., Mitkal, P. K., Pawar, R. N., & Paranjape, R. S. (2016). Review on Computer Forensic. Training, 2(01).
2 Çakir, H., & Kiliç, M. S. (2016). The keyword search method and its importance in computer forensics Adli bilisimde anahtar kelime aramasi metodu ve önemi. Journal of Human Sciences, 13(1), 2368-2384.
3 Velakanti, G., & Katuri, A. (2014). Enhancement of Existing Tools and Techniques for Computer Forensic Investigation. International Journal of Computer Science and Network Security (IJCSNS), 14(12), 74.
4 Bryant, M. S., & Bryant, R. (Eds.). (2014). Policing Digital Crime. Ashgate Publishing, Ltd..
5 Khoury, I., & Caushaj, E.computer forensic.
6 Andrade, M., & Ferreira, M. A. M. (2009). Criminal and civil identification with DNA databases using Bayesian networks. International Journal of Security, 3(4), 65-74.
1 Directory of Open Access Journals (DOAJ)
2 Google Scholar
3 ScientificCommons
4 Academic Index
5 CiteSeerX
6 refSeek
8 Socol@r
9 ResearchGATE
10 Bielefeld Academic Search Engine (BASE)
11 Scribd
12 WorldCat
13 slideshare
15 PdfSR
16 Free-Books-Online
1 www.porcupine.org/forensics/tct.html
2 www.forensicswiki.org/wiki/ILook
3 www.sleuthkit.org/
4 www.accessdata.com
5 http://www.digitalintelligence.com/software/disoftware/drivespy/
6 http://en.wikipedia.org/wiki/EnCase.
7 http://www.x-ways.net/forensics/index-m.html.
8 David Icove, Karl Seqer, William Von Storch, “Computer crime: A Crime-figher’s Handbook”,
9 David Icove, Karl Seqer, William Von Storch, “Computer crime: A Crime-figher’s Handbook”, O'Reilly Media, Inc, USA (1 Aug 1995).
10 Wofle, Henry B, Computers and Security, El sevier Science, Ltd, pp. 26-28.
11 http://www.forensics.com
12 Thomas Rude CISSP, “Evidence Seizure Methodology for Computer Forensics”.
13 http://www.computerforensics.net/forensics.htm
14 Nelson, Bill, Philips, Amelia, Enfinger, Frank and Stewart, Chris, “Guide to Computer Forensics and Investigations”, Thomson, Cousre Technology, Boston, 2004.
15 Anthony Verducci, “How to Absolutely, Positively Destroy Your Data”: DIY Tech, February 2007.
16 Michele C. S. Lange, Kristin M. Nimsger, ‘’Electronic evidence and discovery’’, American Bar Association, 2004.
17 Dinan, Thomas Edward, Robertson, Neil Leslie, Tam, Alan Jun-yuan, “Magnetic head for hard disk drive having varied composition nickel-iron alloy magnetic poles”, U.S. Patent No. 6,912,771. July 5, 2005.
18 Andrew S.Tanenbaum, “Modern Operating Systems” Prentice Hall, Dec. 2007
19 Guy Hart-Davis,”Windows(R) XP Professional: The Complete Reference” McGraw-Hill Osborne, Dec. 2002.
20 Peterson, Siberschaz, Galvin, “Secondary Storage Structure, Advanced Operating
21 Charles H Sobey, “Recovering unrecoverable data”, Channel Science white paper, 14th April 2004.
22 S.Berinato, “Good Stuff Cheap”, CIO, 15 Oct.2002 pp 53-59.
23 M. Villano, “Hard-Drive Magic: Making Data Disappear Forever”, New York
24 Simson L. Garfinkel and Abhi Shelat, “Remembrance of Data Passed: A Study of Disk Sanitization Practices”, IEEE Security & Privacy, Vol. 1, 2003, pp. 17-27.
25 G.Shpantzer and T.Ipsen, “Law Enforcement Challenges in Digital Forensics.” Proc.
26 Thomas Welch, “Handbook of information Security Management”, CRC Press LLC,
27 Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal
Mr. Bhanu Prakash Battula
- India
Mr. KeziaRani
- India
Mr. Satya Prasad
- India
Mr. T. Sudha
- India