• 제목/요약/키워드: Digital Evidence Management

Search Result 166, Processing Time 0.027 seconds

DESIGNIN AND OPERATION OF DIGITAL EVIDENCE MANAGEMENT SYSTEM APPLYING COMPUTER FORENSICS AND ELECTRONIC CERTIFICATION (전자증거 관리시스템의 설계)

  • 김종섭;하옥현;김귀남
    • Proceedings of the Safety Management and Science Conference
    • /
    • 2001.05a
    • /
    • pp.275-280
    • /
    • 2001
  • DESIGNIN AND OPERATION OF DIGITAL EVIDENCE MANAGEMENT SYSTEM APPLYING COMPUTER FORENSICS AND ELECTRONIC CERTIFICATION Digital evidence will be used as a term, which means the electronic form of information which is necessary to confirm or prove the factum of all kinds of behaviors committed through the devices which have data processing ability including computer. It is expected that there will be the increase of legal conflicts surrounding electronic commerce activities as well as the increase of cyber crimes, as the number of Internet users are getting bigger. In order to solve the problems of conflicts derived from electronic commerce, the factum of electronic commerce activities must be confirmed. In order to confirm the factum of electronic commerce activities, the evidence is prerequisite. Almost all evidences relating to the electronic commerce activities exist in digital form. For the reason that the digital evidence can be easily damaged and changed, special management is required to collect, analyze, and preserve the digital evidence. In order to meet this requirement, this study proposes a basic model of digital evidence management system applying computer forensics and electronic authentication.

  • PDF

Digital Content Protection and Computer Forensics Evidence Management Mechanism using MPEG-21 in Network Service Environment (네트워크 서비스 환경에서 MPEG-21을 활용한 디지털 콘텐츠 보호 및 컴퓨터 포렌식스 증거 관리 메커니즘)

  • Jang, Eun Gyeom;Lee, Bum Suk
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.6 no.2
    • /
    • pp.129-141
    • /
    • 2010
  • In network service environment, cultures from diversified fields are easily accessible thanks to the convenient digital content services. Unfortunately, unauthorized access and indiscreet misuse behaviors have deprived content owners of their copyrights. This study suggests an integrity-ensured model applicable for forensic evidence of digital content infringement in network service environment. The suggested model is based on MPEG-21 core components for digital content protection and the system is designed in connection with the components of digital content forensics. Also, the present study suggests an efficient technology to protect and manage computer forensic evidence and digital content by authorizing digital content use and catching infringing logs of authorized users without lag in network environment for the benefit of network security and reliability.

Design and Implementation of a Digital Evidence Management Model Based on Hyperledger Fabric

  • Jeong, Junho;Kim, Donghyo;Lee, Byungdo;Son, Yunsik
    • Journal of Information Processing Systems
    • /
    • v.16 no.4
    • /
    • pp.760-773
    • /
    • 2020
  • When a crime occurs, the information necessary for solving the case, and various pieces of the evidence needed to prove the crime are collected from the crime scene. The tangible residues collected through scientific methods at the crime scene become evidence at trial and a clue to prove the facts directly against the offense of the suspect. Therefore, the scientific investigation and forensic handling for securing objective forensic in crime investigation is increasingly important. Today, digital systems, such as smartphones, CCTVs, black boxes, etc. are increasingly used as criminal information investigation clues, and digital forensic is becoming a decisive factor in investigation and trial. However, the systems have the risk that digital forensic may be damaged or manipulated by malicious insiders in the existing centralized management systems based on client/server structure. In this paper, we design and implement a blockchain based digital forensic management model using Hyperledger Fabric and Docker to guarantee the reliability and integrity of digital forensic. The proposed digital evidence management model allows only authorized participants in a distributed environment without a central management agency access the network to share and manage potential crime data. Therefore, it could be relatively safe from malicious internal attackers compared to the existing client/server model.

A Study on the Providing the Integrity of Digital Evidence while Deleting the irrelevant File (디지털 이미지 증거에서 사건과 무관한 파일 삭제시 무결성 제공 방안 연구)

  • Kim, TaeKyung
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.15 no.4
    • /
    • pp.111-116
    • /
    • 2019
  • The digital forensic analysis ensures the integrity of confiscated data by calculating hash values for seizure and search of digital evidence and receiving confirmation and signature from participants. However, evidence that is irrelevant to the alleged offense needs to be deleted even after seizure from the point of view of privacy. But the hash value is altered by deleting the irrelevant data from the image file, one will not be able to prove that the file is in the initial state when it was seized. Therefore, in this paper, a study was conducted to support the integrity of the digital evidence, even if some of the seized digital evidence was deleted or damaged during the seizure search. The hash value of each data is calculated and hash value of the combination of hash values are also calculated. Even if the unrelated evidence is deleted from the seized evidence regardless of file system such as FAT or NTFS, the suggested method presented a way to provide the integrity that proves there is no change in the evidence file.

Research on Advanced Electronic Records Management Technology Using Digital Forensics (디지털 포렌식 기법을 적용한 전자기록물 관리기술 고도화 연구)

  • Yoo, Hyunguk;Shon, Taeshik
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.2
    • /
    • pp.273-277
    • /
    • 2013
  • Recently, according with a sudden increase of records produced and stored by digital way, it becomes more important to maintain reliability and authenticity and to ensure legal effect when digital records are collected, preserved and managed. On the basis of domestic legal procedure law and record management-related legislation, this paper considered judicial admissibility of evidence on electronic records managed by National Archives of Korea and drew potential problems when these are submitted to court as a evidence. Also, this paper suggested a plan applying digital forensics technique to electronic records management to ensure admissibility of evidence about electronic records stored in National Archives of Korea.

A Study on Digital Evidence Transmission System for E-Discovery (E-Discovery를 위한 디지털 증거 전송시스템에 대한 연구)

  • Lee, Chang-Hoon;Baek, Seung-Jo;Kim, Tae-Wan;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.5
    • /
    • pp.171-180
    • /
    • 2008
  • This paper also suggests the Digital Evidence Transmission System for E-Discovery which is suited to domestic environments in order to solve these problems and promote safe and convenient transmission of the electronic evidences. The suggested Digital Evidence Transmission System for E-Discovery is the system that submit digital evidences to Court's Sever through the Internet using Public Key Infrastructure and Virtual Private Network, and solves the problems - such as privileged and privacy data, trade secret of company, etc.

International Trends of Digital Health and It's Political Implication for Health Technology Assessment (디지털헬스 정책환경의 국제 동향과 의료기술평가에 대한 시사점)

  • Choi, Solji;Cha, Sunmi;Yoo, Keunjoo;Hong, Seokwon;Park, Chong Yon
    • The Journal of Health Technology Assessment
    • /
    • v.6 no.2
    • /
    • pp.95-99
    • /
    • 2018
  • As technologies develop, the digital health sector is gradually expanding. Internationally, the global summit for Digital Health named Global Digital Health Partnership (GDHP) was launched in 2018. Many countries are participating in GDHP and share their policy experiences on digital health and find the ways to cooperate with participating countries (13 countries, including South Korea, and Hong Kong). This article reviewed the international trends in digital health policy environment and evidence assessment focusing on GDHP activities, and derived implications for health technology assessment of digital health. Consequently, to assess the intervention effects of digital health is very complex and the assessment should be considered multidimensional aspects (social, clinical, and technical). In addition the patient experience should be assessed qualitatively. Health technology assessment (HTA) should assess the effect of digital health policies to changes in health care systems resulting from the application of advanced technologies related to the 4th Industrial Revolution. Digital health is also related to new HTA, HTA of existing technologies, and R&D on the promising health technology. Therefore, it is necessary to review the trends of the technology's management policy consistently through the HTA of digital health.

A Mechanism for Securing Digital Evidences of Computer Forensics in Smart Home Environment (스마트홈 환경에서 컴퓨터 포렌식스의 디지털 증거 무결성 보증 메커니즘)

  • Lee, Jong-Sup;Park, Myung-Chan;Jang, Eun-Gyeom;Choi, Yong-Rak;Lee, Bum-Suk
    • The Journal of Information Technology
    • /
    • v.10 no.3
    • /
    • pp.93-120
    • /
    • 2007
  • A Smart Home is a technically expanded from home network that gives us a comfortable life. But still there is a problem such as mal function of devices and intrusions by malicious parties since it is based on home network. The intrusion by malicious parties causes a critical problem to the individual's privacy. Therefore to take legal actions against to the intruders, the intrusion evidence collecting and managing technology are widely researched in the world. The evidence collecting technology uses the system which was damaged by intruders and that system is used as evidence materials in the court of justice. However the collected evidences are easily modified and damaged in the gathering evidence process, the evidence analysis process and in the court. That's why we have to prove the evidence's integrity to be valuably used in the court. In this paper, we propose a mechanism for securing the reliability and the integrity of digital evidence that can properly support the Computer Forensics. The proposed mechanism shares and manages the digital evidence through mutual authenticating the damaged system, evidence collecting system, evidence managing system and the court(TTP: Trusted Third Party) and provides a secure access control model to establish the secure evidence management policy which assures that the collected evidence has the corresponded legal effect.

  • PDF

A Study on Securing the Quality of Trusted Digital Records as Evidence: Focusing on Analysis of Quality Concept and Requirements for Records and Evidence Respectively Covered in Records Management and Judicial Domain (증거로서 신뢰할 수 있는 전자기록의 품질 확보방안 연구 - 기록관리영역과 사법영역에서 다루는 기록과 증거의 품질 개념과 요건 분석을 중심으로 -)

  • Lee, Gemma;Oh, Kyung-Mook
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.32 no.3
    • /
    • pp.217-246
    • /
    • 2021
  • This study aimed to analyze the quality concepts and requirements of digital records as evidence and to find an implication to develop requirements for trusted digital records with securing authoritative qualities. To this end, this study compared requirements of records domain linking records process, records metadata and records systems with judicial domain on digital evidence, and identified the records requirements to secure the legal admissibility linking records and judicial domain. This study analyzed the relationship of quality concepts between digital records and digital evidence, found the legal admissibility is highly related to the reliability, and derived that it needs the measure to secure the reliability at the stage of records creation and capture. To prove authenticity of digital evidence, this study identified importance of records process, records metadata and records system, and proposed the necessity of measurement to secure records' evidence.

An Assurance Mechanism of Intrusion Data for Making Digital Evidence in Digital Computing Environment (디지털 컴퓨팅 환경의 디지털 증거화를 위한 침해 데이터보증 메커니즘)

  • Jang, Eun-Gyeom
    • Journal of Internet Computing and Services
    • /
    • v.11 no.4
    • /
    • pp.129-141
    • /
    • 2010
  • In digital computing environment, for the mal functions in appliances and system errors, the unaccepted intrusion should be occurred. The evidence collecting technology uses the system which was damaged by intruders and that system is used as evidence materials in the court of justice. However the collected evidences are easily modified and damaged in the gathering evidence process, the evidence analysis process and in the court. That’s why we have to prove the evidence’s integrity to be valuably used in the court. In this paper, we propose a mechanism for securing the reliability and the integrity of digital evidence that can properly support the Computer Forensics. The proposed mechanism shares and manages the digital evidence through mutual authenticating the damaged system, evidence collecting system, evidence managing system and the court(TTP: Trusted Third Party) and provides a secure access control model to establish the secure evidence management policy which assures that the collected evidence has the corresponded legal effect.