• Title/Summary/Keyword: evidence information

Search Result 2,260, Processing Time 0.023 seconds

Forensic Evidence of Search and Seized Android and Windows Mobile Smart Phone (압수 수색된 안드로이드와 윈도우모바일 스마트폰의 포렌식 증거 자료)

  • Yoon, Kyung-Bae;Chun, Woo-Sung;Park, Dea-Woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.2
    • /
    • pp.323-331
    • /
    • 2013
  • There are three ways how to extract forensic evidence from mobile phone, such as SYN, JTAG, Revolving. However, it should be a different way to extract forensic evidence due to the differences of their usage and technology between them(mobile phone and smart phone). Therefore, in this paper, I will come up with extraction method that forensics evidence by search and seizure of a smart phone. This study aims to analyze specifications and O.S., backup analysis, evidence in smart to analyze for search and seizure of a smart phone commonly used google android and windows mobile smart phone. This study also aim to extract forensics evidence related to google android and phone book, SMS, photos, video of window mobile smart phone to make legal evidence and forensics report. It is expected that this study on smart phone forensics technology will contribute to developing mobile forensics technology.

A Study on Securing the Quality of Trusted Digital Records as Evidence: Focusing on Analysis of Quality Concept and Requirements for Records and Evidence Respectively Covered in Records Management and Judicial Domain (증거로서 신뢰할 수 있는 전자기록의 품질 확보방안 연구 - 기록관리영역과 사법영역에서 다루는 기록과 증거의 품질 개념과 요건 분석을 중심으로 -)

  • Lee, Gemma;Oh, Kyung-Mook
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.32 no.3
    • /
    • pp.217-246
    • /
    • 2021
  • This study aimed to analyze the quality concepts and requirements of digital records as evidence and to find an implication to develop requirements for trusted digital records with securing authoritative qualities. To this end, this study compared requirements of records domain linking records process, records metadata and records systems with judicial domain on digital evidence, and identified the records requirements to secure the legal admissibility linking records and judicial domain. This study analyzed the relationship of quality concepts between digital records and digital evidence, found the legal admissibility is highly related to the reliability, and derived that it needs the measure to secure the reliability at the stage of records creation and capture. To prove authenticity of digital evidence, this study identified importance of records process, records metadata and records system, and proposed the necessity of measurement to secure records' evidence.

Study on advanced analysis method based on timeline chart for Digital Forensic Investigation (타임라인 분석 기법을 이용한 디지털 증거 분석 방법론)

  • Lee, Keun-Gi;Hwang, Seong-Jin;Lee, Chang-Hoon;Lee, Sang-Jin
    • Journal of Advanced Navigation Technology
    • /
    • v.18 no.1
    • /
    • pp.50-55
    • /
    • 2014
  • Recently, importance of digital forensics has increased and using analysis methods of digital evidence in the analysis of evidence of various types. However, analysis time and effort is steadily increasing because personal disk capacity is too big and it has many number of files. Most digital evidence has time property, such as access time, creation time, and modification time. These time information of digital evidence is one of most important factors in the digital forensic area. But if digital examiner simply analyze based on binary source only, it is possible to have wrong result because time has various types. In this paper, we classify various type of time in the digital evidence and describe advanced analysis method based on timeline chart for digital forensic investigation.

Study on Net Assessment of Trustworthy Evidence in Teleoperation System for Interplanetary Transportation

  • Wen, Jinjie;Zhao, Zhengxu;Zhong, Qian
    • Journal of Information Processing Systems
    • /
    • v.15 no.6
    • /
    • pp.1472-1488
    • /
    • 2019
  • Critical elements in the China's Lunar Exploration reside in that the lunar rover travels over the surrounding undetermined environment and it conducts scientific exploration under the ground control via teleoperation system. Such an interplanetary transportation mission teleoperation system belongs to the ground application system in deep space mission, which performs terrain reconstruction, visual positioning, path planning, and rover motion control by receiving telemetry data. It plays a vital role in the whole lunar exploration operation and its so-called trustworthy evidence must be assessed before and during its implementation. Taking ISO standards and China's national military standards as trustworthy evidence source, the net assessment model and net assessment method of teleoperation system are established in this paper. The multi-dimensional net assessment model covering the life cycle of software is defined by extracting the trustworthy evidences from trustworthy evidence source. The qualitative decisions are converted to quantitative weights through the net assessment method (NAM) combined with fuzzy analytic hierarchy process (FAHP) and entropy weight method (EWM) to determine the weight of the evidence elements in the net assessment model. The paper employs the teleoperation system for interplanetary transportation as a case study. The experimental result drawn shows the validity and rationality of net assessment model and method. In the final part of this paper, the untrustworthy elements of the teleoperation system are discovered and an improvement scheme is established upon the "net result". The work completed in this paper has been applied in the development of the teleoperation system of China's Chang'e-3 (CE-3) "Jade Rabbit-1" and Chang'e-4 (CE-4) "Jade Rabbit-2" rover successfully. Besides, it will be implemented in China's Chang'e-5 (CE-5) mission in 2019. What's more, it will be promoted in the Mars exploration mission in 2020. Therefore it is valuable to the development process improvement of aerospace information system.

Integrity proof Method research in Mobile Forensic (모바일 포렌식 에서의 무결성 입증방안 연구)

  • Kim, Ki-Hwan;Shin, Young-Tae;Park, Dea-Woo
    • KSCI Review
    • /
    • v.15 no.1
    • /
    • pp.37-46
    • /
    • 2007
  • Lately, is trend that diffusion of Mobile information appliance that do various function by development of IT technology is increasing much. There is function that do more convenient and efficient life and business using portable phone that is Daepyo?? of Mobile information appliance, but dysfunction that is utilized by Beopjoe of pointed end engineering data leakage, individual's privacy infringement, threat and threat etc. relationship means to use Mobile Phone is appeared and problems were appeared much. However, legal research of statute unpreparedness and so on need research and effort to prove delete, copy, integrity of digital evidence that transfer secures special quality of easy digital evidence to objective evidence in investigation vantage Point is lacking about crime who use this portable phone. It is known that this digital Forensic field is Mobile Forensic. Is purposeful to verify actually about acquisition way of digital evidence that can happen in this treatise through portable phone that is Mobile Forensic's representative standing and present way to prove integrity of digital evidence using Hash Function.

  • PDF

Implementation of Evidence Based Nursing Education into Nursing Management Clinical Practicum: Outcome Evaluation and Diffusion Strategies (간호관리학 실습에서의 근거기반간호 교육 적용: 결과평가와 확산 전략)

  • Park, Myonghwa
    • Journal of Korean Academy of Nursing Administration
    • /
    • v.19 no.1
    • /
    • pp.39-47
    • /
    • 2013
  • Purpose: This practice study was done to describe the process and outcomes of application of Evidence Based Nursing (EBN) Education to nursing management clinical practicum and suggest strategies to diffuse EBN into nursing management education. Methods: Education on the evidence based nursing management process was provided to 65 senior nursing students from a university. Nursing management clinical practicum integrated with EBN. The setting was a five full day-clinical practicum. Group and individual training on EBN process with lectures, small group discussions, conferences, and educational prescription were provided. Outcomes were analyzed using paired t test for 65 participants. Results: Evidence based nursing competency increased significantly showing improvement in understanding EBN, formulating clinical question, searching & classifying the evidence, recognizing level of evidence, considering patient preference, and evaluating outcomes. Nursing students' access and use of evidence based information resource also improved. Conclusion: The results of this study indicate that the application of EBN to nursing management clinical practicum is effective to improve EBN competency in undergraduate students and should be further applied in nursing education using the systematic strategies.

The Method of Verification for Legal Admissibility of Digital Evidence using the Digital Forensics Ontology (디지털 포렌식 온톨로지를 이용한 디지털 증거의 증거능력에 대한 검증 방법)

  • Cho, Hyuk-Gyu;Park, Heum;Kwon, Hyuk-Chul
    • The KIPS Transactions:PartD
    • /
    • v.16D no.2
    • /
    • pp.265-272
    • /
    • 2009
  • Although the various crime involved numerous digital evidence, the digital evidence is hard to be acknowledged as a evidence to proof the crime fact in court. We propose the method of verification for the legal admissibility of digital evidence using digital forensics ontology. In order to verify the legal admissibility of digital evidence, we will extend the digital ontology by standard digital forensics process from Digital Forensics Technical Manual defined by KNPA and set up the relation properties and the rule of property constraint to process class in the digital forensics ontology. It is possible for proposed ontology to utilize to plan the criminal investigation and to educate the digital forensics.

Screen Capture Authentication System for Web Postings to Used as Digital Evidence (디지털 증거 활용을 위한 웹 게시물 화면캡쳐 인증 시스템)

  • Kang, Ju Young;Lee, Sang Jin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.1
    • /
    • pp.9-16
    • /
    • 2017
  • In modern society, everyone can easily access the Internet and freely express their opinions or ideas on Web bulletin boards or SNS. At the same time, they are often used as a place of slandering and the spreading of false information about celebrities such as entertainers and politicians. Typically people use the screen capture method to submit web posts as evidence in lawsuits. But it is difficult to get these accepted as evidence in court because screen captured images are easily forged and tempered. Therefore, as described above, using "Proxy Browser", we propose a screen capture authentication system for web posts that protects forging and tempering to use as digital evidence in court.

A Study on the Chain of Custody for Securing the Faultlessness of Forensic Data (포렌식 자료의 무결성 확보를 위한 수사현장의 연계관리 방법 연구)

  • Lee, Gyu-An;Shin, Young-Tae;Park, Dea-Woo
    • KSCI Review
    • /
    • v.14 no.2
    • /
    • pp.225-234
    • /
    • 2006
  • Computer Forensics functions by defending the effects and extracting the evidence of the side effects for production at the court. Has the faultlessness of the digital evidence been compromised during the investigation, a critical evidence may be denied or not even be presented at the trial. The presented monograph will deliberate the faultlessness-establishing chain procedures in disk forensics. system forensics, network forensics, mobile forensics and database forensics. Once the faultlessness is established by the methods proposed, the products of investigation will be adopted as a leading evidence. Moreover, the issues and alternatives in the reality of digital investigation are presented along with the actual computer forensics cases, hopefully contributing to the advances in computer digital forensics and the field research of information security.

  • PDF

Evaluating LIMU System Quality with Interval Evidence and Input Uncertainty

  • Xiangyi Zhou;Zhijie Zhou;Xiaoxia Han;Zhichao Ming;Yanshan Bian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.11
    • /
    • pp.2945-2965
    • /
    • 2023
  • The laser inertial measurement unit is a precision device widely used in rocket navigation system and other equipment, and its quality is directly related to navigation accuracy. In the quality evaluation of laser inertial measurement unit, there is inevitably uncertainty in the index input information. First, the input numerical information is in interval form. Second, the index input grade and the quality evaluation result grade are given according to different national standards. So, it is a key step to transform the interval information input by the index into the data form consistent with the evaluation result grade. In the case of uncertain input, this paper puts forward a method based on probability distribution to solve the problem of asymmetry between the reference grade given by the index and the evaluation result grade when evaluating the quality of laser inertial measurement unit. By mapping the numerical relationship between the designated reference level and the evaluation reference level of the index information under different distributions, the index evidence symmetrical with the evaluation reference level is given. After the uncertain input information is transformed into evidence of interval degree distribution by this method, the information fusion of interval degree distribution evidence is carried out by interval evidential reasoning algorithm, and the evaluation result is obtained by projection covariance matrix adaptive evolution strategy optimization. Taking a five-meter redundant laser inertial measurement unit as an example, the applicability and effectiveness of this method are verified.