Font Size: a A A

Forensic Rules And Technical Research On Key Network Facilities In Investigation

Posted on:2018-09-25Degree:MasterType:Thesis
Country:ChinaCandidate:Y J RenFull Text:PDF
GTID:2356330566450243Subject:Public security
Abstract/Summary:PDF Full Text Request
The key network facilities is not only an important object of obtaining evidence in cybercrime cases,but also the key factor in the investigation of cybercrime cases.However,due to the complexity of the key network facilities,low level of forensic technology and the lagging of evidence technology,the progress of forensics work in network facilities is slow,which makes it difficult to investigate criminal cases.In order to improve the quality of evidence collection for key network facilities and to fully exploit evidence of cases in key network facilities,as well as give full play to the crucial role of key network facilities in the detection process of crimes,Investigators should work from the following aspects.First,to fully grasp the nature and characteristics of key network facilities and know the types of evidence contained.Secondly,it is necessary to clearly understand the current status of the key network forensics and the main problems that the investigators are faced with,especially in the rules and technical deficiencies,so as to achieve targeted response measures.Thirdly,we should improve the rules of evidence collection of key network facilities,update the content of the existing rules,build a complete and perfect rules system,and improve the current forensic methods.Fourthly,develop vital techniques of the key network facilities.Combined with the actual needs of the department of investigation,this part elaborates the evidence collection process and method of four types of key network facilities,which are router,wireless access point,intrusion detection system,and web/web proxy cache server,so as to help the investigators have a comprehensive understanding of the key network facilities,deal with difficult problems of obtaining evidence effectively,as well as provide reference for practical work.This paper adopts literature research method and case analysis method to elaborate.On the one hand,through combing,analyzing and summarizing the main points of key network facilities,this part set up the basis of studying and analyzing this issue.On the other hand,combined with the practice of investigation,this paper analyzes specific cases in evidencecollecting practice carefully,constituting a part of the content of the article.The contents of this article contains four parts,they are as follows: Part one is about the overview of key network facilities.This paper defines the concept of key network facilities.The second part is about the status quo and major problems of key network facilities.Combining the current crime situation of cybercrime cases and the practice of obtaining evidence,this paper mainly analyzes key network facilities' current situation of obtaining evidence.The third part is about improving and perfecting key network facilities' rules and system of obtaining evidence.This paper discusses the way to perfecting methods of obtaining evidence from two levels.One is perfecting the system of rules of obtaining evidence,the other is perfecting the patterns and modes of establishing structure of obtaining evidence.The fourth part is about improving the key network facilities' technical system of investigating and obtaining evidence.By analyzing the four types of network facilities with high evidence value,this paper improves the technical methods and systems of obtaining evidence that belong to four types of the key network facilities from perspectives of the process and methods of obtaining evidence.
Keywords/Search Tags:Key Network Facilities, the Investigation and Evidence Collection, Improve the Rules, the Development of the Technology
PDF Full Text Request
Related items