• Title/Summary/Keyword: digital evidence

Search Result 498, Processing Time 0.045 seconds

A Study on Extraction of Mobile Forensic Data and Integrity Proof (모바일 포렌식 자료의 추출과 무결성 입증 연구)

  • Kim, Ki-Hwan;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.6
    • /
    • pp.177-185
    • /
    • 2007
  • Lately, it is a trend that diffusion of Mobile Information Appliance that do various function by development of IT technology. There is function that do more convenient and efficient exchange information and business using mobile phone that is Mobile Information Appliance, but disfunction that is utilized by pointed end engineering data leakage, individual's privacy infringement, threat, etc. relationship means to use mobile phone is appeared and problems were appeared much. However, legal research of statute unpreparedness and so on need research and effort to prove delete, copy, integrity of digital evidence that transfer secures special quality of easy digital evidence to objective evidence in investigation vantage point is lacking about crime who use this portable phone. It is known that this Digital Forensic field is Mobile Forensic. In this paper. We are verify about acquisition way of digital evidence that can happen in this treatise through mobile phone that is Mobile Forensic's representative standing and present way to prove integrity of digital evidence using Hash Function.

  • PDF

A Study on the Design and Implementation of an Digital Evidence Collection Application on Windows based computer (윈도우 환경에서의 증거 수집 시스템 설계 및 구현에 관한 연구)

  • Lee, SeungWon;Roh, YoungSup;Han, Changwoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.1
    • /
    • pp.57-67
    • /
    • 2013
  • Lately, intrusive incidents (including system hacking, viruses, worms, homepage alterations, and data leaks) have not involved the distribution of an virus or worm, but have been designed to acquire private information or trade secrets. Because an attacker uses advanced intelligence and attack techniques that conceal and alter data in a computer, the collector cannot trace the digital evidence of the attack. In an initial incident response first responser deals with the suspect or crime scene data that needs investigative leads quickly, in accordance with forensic process methodology that provides the identification of digital evidence in a systematic approach. In order to an effective initial response to first responders, this paper analyzes the collection data such as user usage profiles, chronology timeline, and internet data according to CFFPM(computer forensics field triage process model), proceeds to design, and implements a collection application to deploy the client/server architecture on the Windows based computer.

Analysis of anti-forensic trends and research on countermeasuresucation (안티 포렌식 동향 분석 및 대응 방안 연구)

  • Han Hyundong;Cho Young Jun;Cho Jae Yeon;Kim Se On;Han Wan Seop;Choi Yong Jun;Lee Jeong Hun;Kim Min Su
    • Convergence Security Journal
    • /
    • v.23 no.1
    • /
    • pp.97-107
    • /
    • 2023
  • With the popularization of digital devices in the era of the 4th industrial revolution and the increase in cyber crimes targeting them, the importance of securing digital data evidence is emerging. However, the difficulty in securing digital data evidence is due to the use of anti-forensic techniques that increase analysis time or make it impossible, such as manipulation, deletion, and obfuscation of digital data. Such anti-forensic is defined as a series of actions to damage and block evidence in terms of digital forensics, and is classified into data destruction, data encryption, data concealment, and data tampering as anti-forensic techniques. Therefore, in this study, anti-forensic techniques are categorized into data concealment and deletion (obfuscation and encryption), investigate and analyze recent research trends, and suggest future anti-forensic research directions.

Clinical Application of Digital Therapeutics for Insomnia (불면증 디지털 치료제의 임상 적용)

  • Cho, Chul-Hyun
    • Sleep Medicine and Psychophysiology
    • /
    • v.28 no.1
    • /
    • pp.6-12
    • /
    • 2021
  • Insomnia is one of the most common sleep disorders experienced by modern people, and treatment is often not adequate due to various limitations. Digital therapeutics for insomnia are expected to play a revolutionary role in supplementing and satisfying unmet needs in real-world clinical treatment. Digital therapeutics for insomnia were developed based on cognitive-behavioral therapy for insomnia, which is the first standard treatment for insomnia. The effectiveness of digital therapeutics for insomnia developed by several companies has been proven through well-designed clinical research. Various approaches have been used for practical application of digital therapeutics for insomnia. Thus far, meaningful results have been drawn, but there are areas that need to be improved upon based on real-world evidence. Sleep researchers need to validate the safe and effective application of digital therapeutics for the treatment of insomnia.

Record File Carving Technique for Efficient File Recovery in Digital Forensic Investigation (디지털 포렌식 조사에서 효율적인 파일 복구를 위한 레코드 파일 카빙 기법)

  • Park, Minsu;Park, Jungheum;Lee, Sangjin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.2
    • /
    • pp.93-102
    • /
    • 2013
  • These days digital data have become essential for digital investigation because most of the crime was occurred by using the digital devices. However, digital data is very easier to falsify or delete. If digital data was deleted, it is necessary to recover the deleted data for obtain digital evidence. Even though file carving is the most important thing to gather. digital evidence in digital forensic investigation, most of popular carving tools don't contemplate methods of selection or restoration for digital forensic investigation. The goal of this research is suggested files which can obtain useful information for digital forensic investigation and proposed new record file carving technique to be able to recover data effectively than before it.

Study on Factors Affecting Turnover Intention of Digital evidence analyst : Focus on Job stress, Job satisfaction, Organizational commitment (디지털증거분석관의 이직 의도에 영향을 주는 요인에 관한 연구 - 직무스트레스, 직무만족, 조직몰입을 중심으로)

  • Kim, Kyu-Rim;Kwak, Na-Yeon;Lee, Choong C.
    • Journal of Digital Convergence
    • /
    • v.16 no.8
    • /
    • pp.1-10
    • /
    • 2018
  • With advances in digital technologies digital crimes also rapidly have been increased. For this reason, the digital forensics has an important role in investigating digital crimes. In particular digital evidence analysts have been responsible for more workloads as much increased as it reflects an importance of their task. However previous researches have more focused on technology, not much on their work circumstance and behaviors. This study is to draw out factors affecting job stress and its effects on their turnover rate as it considers Job satisfaction, organization commitment. In this study, survey have been conducted targeting 124 personnel in National Police Agency and then the collected data were analyzed by using Smart PLS 3.0. This study have proved that causal relationship between job stress, satisfaction, commitment and job turnover respectively which is borrowed from organizational concepts. There will be theoretical and practical contribution to improve work circumstance and secure digital forensic talents as well.

A Study on the Chain of Custody for Securing the Faultlessness of Forensic Data (포렌식 자료의 무결성 확보를 위한 수사현장의 연계관리 방법 연구)

  • Lee, Gyu-an;Shin, young-Tae;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.6 s.44
    • /
    • pp.175-184
    • /
    • 2006
  • Computer Forensics functions by defending the effects and extracting the evidence of the side effects for production at the court. Has the faultlessness of the digital evidence been compromised during the investigation, a critical evidence may be denied or not even be presented at the trial. The presented monograph will deliberate the faultlessness-establishing chain procedures in disk forensics, system forensics, network forensics, mobile forensics and database forensics. Once the faultlessness is established by the methods proposed, the products of investigation will be adopted as a leading evidence. Moreover, the issues and alternatives in the reality of digital investigation are presented along with the actual computer forensics cases, hopefully contributing to the advances in computer digital forensics and the field research of information security.

  • PDF

Collection and Analysis of the Digital Evidence for Android and iOS Smart Phones (Android & iOS 기반 스마트폰의 디지털 증거 수집 및 분석)

  • Goo, Bon-Min;Kim, Ju-Young;Lee, Tae-Rim;Shin, Sang-Uk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.1
    • /
    • pp.167-175
    • /
    • 2011
  • As recent emergence of smart phones, mobile services are growing in various forms. Many companies released smart phones of various operating systems such as Window Mobile, Android and iOS. Currently, most popular smart phone operating systems are Android and iOS. Due to the various features of these smart phone, they can be employed to various crimes. From the point of view of digital forensics, this paper analyzes the evidence data which needs to be collected in the smart phone, and implements the evidence analysis tool. By using this tool, it can reduce the time and effort for collecting and analyzing the evidence of the smart phone.

Merging the old with the new: a cybermedicine marriage for oncology interactions with traditional herbal therapies and complementary medicines

  • Yap, Kevin Yi-Lwern;Lim, Ken Juin
    • CELLMED
    • /
    • v.2 no.2
    • /
    • pp.18.1-18.16
    • /
    • 2012
  • An oncology-specific database called OncoRx (http://bit.ly/cancerRx) was previously set up in cyberspace to aid clinicians in identifying interactions of anticancer drugs (ACDs) and chemotherapy regimens with traditional Chinese medicines (TCMs) and complementary and alternative medicines (CAMs). Since then, users have requested the drug-CAM interactions (DCIs) of 5 specific CAMs (cranberry, melatonin, co-enzyme Q10, huachansu, reishi mushroom) to be updated in the database. Pharmacokinetic properties (metabolism, enzyme induction/inhibition, elimination), TCM properties and DCIs of each CAM were collated with 117 ACDs using 9 hardcopy compendia and online databases as resources. Additionally, individual ACDs and CAMs were used as keywords for PubMed searches in combination with the terms 'anticancer drugs', 'drug interactions', 'herb-drug/drug-herb interactions', 'pharmacokinetic interactions' and 'pharmacodynamic interactions'. DCI parameters consisted of interaction effects, evidence summaries, proposed management plans and alternative non-interacting CAMs, together with relevant citations and update dates of the DCIs. OncoRx is also used as a case to introduce the "Four Pharmaco-cybernetic Maxims" of quality, quantity, relationship and manner to developers of digital healthcare tools. Its role in Hayne's "5S" hierarchy of research evidence is also presented. OncoRx is meant to complement existing DCI resources for clinicians and alternative medicine practitioners as an additional drug information resource that provides evidence-based DCI information for ACD-CAM interactions.

Digital Evidence Collection Procedure for Hardware Unique Information Collection (하드웨어 고유 정보 수집에 대한 디지털 증거 수집 절차)

  • Pak, Chan-ung;Lee, Sang-jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.4
    • /
    • pp.839-845
    • /
    • 2018
  • Sensitive data is encrypted and stored as privacy policy is strengthened through frequent leakage of personal information. For this reason, the cryptographically owned encrypted data is a very important analysis from the viewpoint of digital forensics. Until now, the digital evidence collection procedure only considers imaging, so hardware specific information is not collected. If the encryption key is generated by information that is not left in the disk image, the encrypted data can not be decrypted. Recently, an application for performing encryption using hardware specific information has appeared. Therefore, in this paper, hardware specific information which does not remain in file form in auxiliary storage device is studied, and hardware specific information collection method is introduced.