Skip Nav Destination
ASME Press Select Proceedings
International Conference on Computer Technology and Development, 3rd (ICCTD 2011)
ISBN:
9780791859919
No. of Pages:
2000
Publisher:
ASME Press
Publication date:
2011
eBook Chapter
5 Approach of Crime Scene Protection concerning Computer Forensics
By
Qiangwei Hang
,
Qiangwei Hang
Key Laboratory of Information Network Security,
Ministry of Public Security, People's Republic of China
, (The Third Research Institute of Ministry of Public Security)
Search for other works by this author on:
Ying Zhang
Ying Zhang
Key Laboratory of Information Network Security,
Ministry of Public Security, People's Republic of China
, (The Third Research Institute of Ministry of Public Security)
Search for other works by this author on:
Page Count:
5
-
Published:2011
Citation
Hang, Q, & Zhang, Y. "Approach of Crime Scene Protection concerning Computer Forensics." International Conference on Computer Technology and Development, 3rd (ICCTD 2011). Ed. Zhou, J. ASME Press, 2011.
Download citation file:
Nowadays the computer crime has increased year by year around world due to the rapid development of computer technology. Consequently computer forensics has aroused wide attentions from scientists and government officials. In order to collect digital evidences which are supposed to be present in courts and maintain the integrality of evidence chain, crime scene protection is treated to be the critical factor during the computer forensics. This paper provides the foundation approach for initial computer scene investigation, outlines collection, documentation and electronic evidence storage.
Abstract
Key Words
1. Introduction
2. Protect the Scene
3. Site-Clearnce
4. Documentation
5. Packaging, Transportation and Storage
6. Summaries
Acknowledgement
References
This content is only available via PDF.
You do not currently have access to this chapter.
Email alerts
Related Chapters
Analysis of Email Communication and Forensics
Proceedings of the International Conference on Internet Technology and Security
A Model for NFAA-Network Forensics Attack Analysis
International Conference on Computer Engineering and Technology, 3rd (ICCET 2011)
Attack Graphs with Anti-Forensics Tool - in Forensics Examination
International Conference on Computer Research and Development, 5th (ICCRD 2013)
Investigating the Process Block for Memory Analysis
International Conference on Computer and Electrical Engineering 4th (ICCEE 2011)
Related Articles
Forensic Examination
Mechanical Engineering (June,2000)
Structures and Geriatrics From a Failure Analysis Experience Viewpoint
Appl. Mech. Rev (May,1993)
Confirmation of Creep and Fatigue Damage in Pb/Sn Solder Joints
J. Electron. Packag (June,1992)