View Full Document

Forensic and Anti-Forensic Computing



View the full content.
View Full Document
View Full Document

9 views

Unformatted text preview:

Forensic and Anti Forensic Computing by Christian Johansson December 2002 Forensic and Anti Forensic Computing Christian Johansson Abstract Computer forensics is the use of computer investigation and analysis techniques to identify examine and preserve electronic information potentially for this to be used as evidence in a court of law Anti forensics is the attempt to reduce the quantity and quality of data gathered by the above mentioned activity In addition to describing the history and current status of forensics anti forensics this paper concentrates on the possible future developments in these conflicting yet forever intertwined areas 1 11 Forensic and Anti Forensic Computing by Christian Johansson December 2002 Introduction One might be forgiven for thinking that computer forensics is a new concept but the fact of the matter is that evidence derived from computers has been appearing in courts since at least the early seventies During those early days the computer derived evidence was usually treated as any other evidence but as time went on it became more and more apparent that the similarities between conventional evidence and computer derived evidence was not all that great The art of collecting preserving and analyzing computerderived evidence soon proved to need another approach than conventional forensics Conventional evidence all live in an analog world whereas computer derived evidence comes from a digital world and the transition between these worlds is not always as smooth as one would hope Another constant problem when dealing with computer forensics is how to present the evidence for laymen in the jury and others A conventional piece of evidence in the form of a bloody and fingerprint ridden knife found sticking out of a freshly killed teenage maiden is very easy to interpret for any modestly intelligent person In computer forensics you might have multiple instances of such knifes and smoking guns but it is not that easy to present this evidence in



Access the best Study Guides, Lecture Notes and Practice Exams

Loading Unlocking...
Login

Join to view Forensic and Anti-Forensic Computing and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Forensic and Anti-Forensic Computing and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?