Font Size: a A A

The Research Of Secretly Gain Computer Lead Plane Obtains Evidences Technology

Posted on:2009-08-05Degree:MasterType:Thesis
Country:ChinaCandidate:Y JiangFull Text:PDF
GTID:2178360242477103Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
The computer obtains evidence science is one to relate to computer science, science of law investigates as well as criminal to learn to wait for multidisciplinary new science. The activity is more and more rampant with the fact that the computer art maturity is that the marriage partner and the new model of all kinds taking computer as guilty tools commit a crime with extensive use, with computer information system commit a crime. The computer obtains evidence at present the technology already becomes the world every research of the advanced country hot spot. We go deep into the science having studied the computer obtains evidence, and the secret information having developed the computer lead plane here on the basis obtains evidence systematically.The computer lead plane obtains evidence secretly platform uses the job contacting way or the network way implantation target lead plane, concealing on target lead plane.The system concealing information obtaining evidence runs the simultaneous, computer lead plane in far end security environment obtain evidence managing platform , face to face entire obtain evidence process and later stage handle active effluence instruction. Obtain evidence managing platform having the artwork-rization under the control of interface to be for operation personnel's being put into use.Secret information of computer obtains evidence systematically in system oneself is safe; Protect the target lead plane system; Evidence and real time supervisory control concealing a field returning to the biography electron manage safety waiting to have got the certain technology on the aspect technology be in the lead, an implement with the same kind obtaining evidence being compared with each other having acclimatization characteristics such as strong , handling to defend the simplicity , the function conveniently, reliably as well as modularization designs that the promotion bringing about facilitates.
Keywords/Search Tags:Conceal information, Obtain evidence, Encrypting File System, Gain a password, Information security, Tunnel technology
PDF Full Text Request
Related items