Computer forensics and digital evidence /

Saved in:
Bibliographic Details
Author / Creator:Lori, Margherita, author.
Imprint:Oisterwijk, The Netherlands : Wolf Legal Publishers, [2017]
©2017
Description:111 pages : illustration ; 24 cm
Language:English
Subject:
Format: Print Book
URL for this record:http://pi.lib.uchicago.edu/1001/cat/bib/11335631
Hidden Bibliographic Details
ISBN:9789462403062 (paperback)
9462403066 (paperback)
Notes:Includes bibliographical references.
Summary:The book has the aim to explain the relevance of the Computer Forensic within investigations related to crimes which involve technology supports. The paramount importance that the innovations have gained in people's life is a signal of the necessity to acquire knowledges about them. This statement must be considered especially in regards to crime investigations where an unlawful act could irremediably damage lives and rights. Experts in this area are constantly asked to improve their competence in regards to technological data collection, analysis and conservation due to the difficulty to preserve them as a reliable proof in the Court. Although many difficulties still cause flaws within the Computer Forensic investigations, the development of this branch of knowledge are increasing every day. This publication tries to outline an understandable and incisive description it under a scientific and legal point of view.
Table of Contents:
  • Introduction
  • 1. Computer Forensics
  • 1.1. Computer Forensics and Digital Forensics
  • 1.1.1. Computer Forensics and Second World War
  • 1.2. The Computer as a Proof
  • 1.3. The Computer Forensic Experts Skills
  • 2. The Digital Proof
  • 2.1. The Digital Evidence Description
  • 2.2. European Legislation around Digital Evidence. The Budapesi Convention and the European Informatics Data Exchange Framework for Courts and Evidence
  • 2.3. The Best Practices
  • 3. Acquisition, Conservation and Analysis of Digit Al Evidence
  • 3.1. Introduction
  • 3.2. Identification and Localisation of the Digital Evidence
  • 3.2.1. Different Approaches to the Personal Computer Related to Its Condition at the Beginning of the Investigations
  • 3.2.2. Registration of Sounds or Images
  • 3.2.3. The Data Interpretation
  • 3.2.4. The Collection
  • 3.2.5. The E-Mail, Sequestration (The Italian Case)
  • 3.3. The Copying
  • 3.3.1. The Transport
  • 3.4. The Data Analysis
  • 3.5. The Verbalisation of Digital Evidence
  • 4. The Digital Evidence in the Trial
  • 4.1. Iacis (International Association of Computer Investigative Specialists)
  • 4.2. Methods Concluded to Generate Reliable Digital Evidence
  • 4.3. Computer Forensics Cases
  • Conclusion
  • Bibliography
  • Annex