z-logo
open-access-imgOpen Access
Computer technique for the suitability of digital evidence in attacking an information system: Forensic analysis for the digital custody chain
Author(s) -
N Jácome-Castilla,
C Villamizar-Nuñez
Publication year - 2019
Publication title -
journal of physics. conference series
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.21
H-Index - 85
eISSN - 1742-6596
pISSN - 1742-6588
DOI - 10.1088/1742-6596/1388/1/012027
Subject(s) - digital evidence , damages , computer science , computer forensics , digital forensics , computer security , process (computing) , event (particle physics) , information security , risk analysis (engineering) , business , law , physics , quantum mechanics , political science , operating system
This article presents results of a research project that attempted to create a model of forensics in an information system; since forensic analysis allows to establish the causes of security commitment information system. The aim of the study was to determine the software tools to be used in the management of security incidents in an information system; required for the design of computer art for extracting digital evidence to anchor the chain of custody items. The research methodology was descriptive and applied document type, by analyzing the different tools technique that allows maintenance of digital evidence was designed, preserving the integrity of this as a test mechanism in a judicial process. In this way, the procedures to be performed to store information were established without being altered chain of custody solving the above questions: What is the chronological order in which the events of alteration, transmission or access occurred? What evidence have to believe you are a victim?, what are the damages incurred?, who do responsible for the incident?, what people are suspicious of the event?, who has investigated the incident and which actions has taken to preserve, identify, collect and analyze the data involved?; ensuring this way through technical steps and tools to be used for the preservation of the chain of custody, as an evidence in a court case.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here