Font Size: a A A

Research On Computer Information Sources Of Electronic Material Evidence Technology

Posted on:2013-04-26Degree:MasterType:Thesis
Country:ChinaCandidate:L N WuFull Text:PDF
GTID:2246330395470814Subject:Procedural Law
Abstract/Summary:PDF Full Text Request
Electronic material evidence technology develops such as the emerging science andtechnology up which is along with the computer technology,and it is to be the traditionalmaterial evidence of a supplement and technology development.In the rapid developmentof computer information today,it is conducive to get huge amounts of informationtechnology in the important data,as well as improves the high-tech crime solving crimesinvestigation of cases.In this article,it takes the basic connotation and classification of the electronicmaterial evidence technical theory category to be the logic starting point for the study,takes the foundation of collecting and fixing the electronic evidence, through theperspective from the computer information source to research electronic materialevidence,it explains electronic material evidence data information collection,fixedprinciples,the use of specialized equipment and collection,fixed object to interpretation.Discussing the research content of electronic material evidence technology whichsources from the computer information(based on the electronic material evidencetechnology of the host and the network),making a certain extent analysis and summary ofwhich involved typical technology method.Among them,electronic material evidence technology which based on the host mainlyincludes:electronic material evidence data recovery technology,computer hard diskforensics copy technology,data information screening analysis technology,the passwordcrack analysis technology and protocol analysis technology;but electronic materialevidence technology which based on computer information mainly includes:electronicmaterial evidence network sniffer technology,electronic material evidence web crawlerstechnology,network mining technology and the vulnerability scanning technique.Throughthe analysis introduction of different kinds of specific operation,explained in a higherdegree the operation process of all kinds of specific technology in differentpractice.Provided a feasible theory basis to collection,fixed electronic material evidencedata information,made electronic material evidence data information more accurate andtimely.Through to all kinds of electronic technology to computer information source materialevidence for the division of classification standard.Various kinds of electronic materialevidence of technology has been rational the direct-viewing understood,can theoretically on the operation and use all kinds of electronic material evidence of the methods,procedures to technical guidance.For all kinds of technical researches in at the same time,the more commonly used data mining technology vulnerability scanning technique andtheir advantages and disadvantages are discussed,especially through the form of datamining technology in the form of an in-depth study,for technology practical providestheoretical guidance....
Keywords/Search Tags:Computer, Electronic Material Evidence Technology, Data RecoveryTechnology, Network Sniffer Technology, Data Mining Technology, Vulnerability Scanning Technology
PDF Full Text Request
Related items