Call for Papers - Ongoing round of submission, notification and publication.
    
  
Home    |    Login or Register    |    Contact CSC
By Title/Keywords/Abstract   By Author
Browse CSC-OpenAccess Library.
  • HOME
  • LIST OF JOURNALS
  • AUTHORS
  • EDITORS & REVIEWERS
  • LIBRARIANS & BOOK SELLERS
  • PARTNERSHIP & COLLABORATION
Home   >   CSC-OpenAccess Library   >    Manuscript Information
Full Text Available
(no registration required)

(66.57KB)


-- CSC-OpenAccess Policy
-- Creative Commons Attribution NonCommercial 4.0 International License
>> COMPLETE LIST OF JOURNALS

EXPLORE PUBLICATIONS BY COUNTRIES

EUROPE
MIDDLE EAST
ASIA
AFRICA
.............................
United States of America
United Kingdom
Canada
Australia
Italy
France
Brazil
Germany
Malaysia
Turkey
China
Taiwan
Japan
Saudi Arabia
Jordan
Egypt
United Arab Emirates
India
Nigeria
Computer Forensic: A Reactive Strategy for Fighting Computer Crime
Abdullahi Mohammed, Enoch O. Nwachukwu
Pages - 157 - 163     |    Revised - 31-05-2015     |    Published - 30-06-2015
Published in International Journal of Computer Science and Security (IJCSS)
Volume - 9   Issue - 3    |    Publication Date - May / June 2015  Table of Contents
MORE INFORMATION
References   |   Abstracting & Indexing
KEYWORDS
Computer Forensic, Digital Evidence, Digital Forensic, Time Stamp, Computer Crime.
ABSTRACT
Computer Forensics is the science of obtaining, preserving, documenting and presenting digital evidence, stored in the form of encoded information, from digital electronic storage devices, such as computers, Personal Digital Assistance (PDA), digital cameras, mobile phones and various memory storage devices. All must be done in a manner designed to preserve the probative value of the evidence and to assure its admissibility in legal proceeding. The word forensics means “to bring to the court”. Forensics deals primarily with the recovery and analysis of latent evidence. Latent evidence can take many forms, from fingerprints left on a window to deoxyribonucleic acid (DNA) evidence recovered from blood stains to the files on a hard drive. This paper provides a high-level overview on computer forensics investigation phases for both technical and nontechnical audience. Although the term “computer” is used, the concept applies to any device capable of storing digital information.
ABSTRACTING & INDEXING
1 Google Scholar 
2 CiteSeerX 
3 refSeek 
4 Scribd 
5 SlideShare 
6 PdfSR 
REFERENCES
A. J. Marcella, Jr. and D. Menendez. "Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes," (2nd Edition): Taylor & Francis Group, LLC. 2008.
A. Richard, H. Val and M. Graham (2012). "'The Advanced Data Acquisition Model (ADAM): A process model for digital forensic practice" Journal of Digital Forensics, Security and Law, Vol. 8(4).
AAFS. “So you want to be a forensic scientist?” American Academy of Forensic Science, Available at: http://www.aafs.org/default.asp?section_id=resources&page_id=choosing_a_career
B. Carrier (2001) "Defining digital forensic examination and analysis tools". Digital Research Workshop II. CiteSeerX: 10.1.1.14.8953.
B. Carrier, (2001b). “Defining Digital Forensic examination and Analysis Tools” Digital Research Workshop II. Available at: www.acm.org [Accessed on 15/10/2012].
B. Schatz. “Digital Evidence: Representation and Assurance”. Doctorate Thesis, Submitted to Information Security Institute, Faculty of Information Technology, Queensland University of Technology, 2010.
C. Eoghan (2004). "Digital Evidence and Computer Crime, Second Edition". Elsevier. ISBN 012-163104-4.
E.O. Nwachukwu, A Mohammed. D.C. Igweze and V.O. Ewulonu "Microsoft Windows Based Computer Forensic" International Journal of Information Technology and Business Management; 2927(1):2012-2014.
F. Adelstein. "MFP: The Mobile Forensic Platform". International Journal Of Digital Evidence, Spring 2003, Volume 2. Issue 1.
Federal Rule of Evidence. Available at; http://federalevidence.com/rules-ofevidence#Rule702 Retrieved on 2nd May, 2014.
G. Palmer, G. “A road Map for Digital Forensic Research, in First Digital Forensic Research Workshop”, G. Palmer, Editor. 2001: Ucita, New York. www.acm.org.
J. Beckett, J., “Digital Forensics: Validation and Verification in a Dynamic Work Environment”. 40th Annual Hawaii International Conference on System Science. 2007: Hawaii.
J. E. Regan. "The Forensic Potential of Flash Memory". Master's Thesis. Naval Postgraduate School, Monterey, CA, 2009.
M Reith, C Carr and G Gunsch, (2002).“Anexamination of Digital Forensic models”. International Journal of Digital Evidence [online]. Available at: www.acm.org [Accessed on 15/10/2012].
N.L Beebe and J.G Clark. “A Hierarchical, Objectives-Based Framework for Digital Investigations Process”, 4th Digital Forensics Research Workshop. 2004: Baltimore, MD.
National Institute of Justice. "Electronic Crime Scene Investigation: A Guide for First Responder". Washington, D.C.: U.S. Department of Justice, National Institute of Justice, 2004. NCJ 187736. http://www.ojp.usdoj.gov/nij.
R. McKemmish, 1999, “What is Forensic Computing?” Trends and Issues in Crime and Criminal Justice, Australian Institute of Criminology. Available at: http://aic.gov.au/documents/9/C/A/%7B9CA41AE8-EADB-4BBF-989464E0DF87BDF7%7Dti118.pdf [Accessed on 20/10/2012]
S. Garfinkel, "Forensic Feature Extraction and Cross-Drive Analysis". The 6th Annual Digital Forensic Research Workshop Lafayette, Indiana, August 14-16, 2006.
MANUSCRIPT AUTHORS
Mr. Abdullahi Mohammed
University of Portharcourt - Nigeria
Abdulmohammedabdul@yahoo.com
Mr. Enoch O. Nwachukwu
University of Portharcourt - Nigeria


CREATE AUTHOR ACCOUNT
 
LAUNCH YOUR SPECIAL ISSUE
View all special issues >>
 
PUBLICATION VIDEOS
 
You can contact us anytime since we have 24 x 7 support.
Join Us|List of Journals|
    
Copyrights © 2025 Computer Science Journals (CSC Journals). All rights reserved. Privacy Policy | Terms of Conditions