DEFSOP、NIST Cell SOP、ISO27037 SOP的比较分析研究

I. Lin, Yun-Sheng Yen, Fang-Yie Leu
{"title":"DEFSOP、NIST Cell SOP、ISO27037 SOP的比较分析研究","authors":"I. Lin, Yun-Sheng Yen, Fang-Yie Leu","doi":"10.1109/IMIS.2014.74","DOIUrl":null,"url":null,"abstract":"In recent years, Information and Communication Technology (ICT) has developed rapidly, and smart phones have become very important communication tools in the modern world. Because smart phones contain copious personal information and have high mobility and powerful hardware, crimes involving smart phones have increased rapidly. There are many types of modus operandi that are increasing, and smart phones have become one of the highly technical tools used to commit a crime. In view of this, our research will discuss Smart-Phone Digital Evidence Forensics Standard Operating Procedure (Smart-Phone DEFSOP) which was proposed by Prof. I-Long, Lin. Our research will compare with the SOP which was proposed by National Institute of Standards and Technology (NIST) cell SOP, and ISO27037. Finally, we will use trusted third party forensics tools to collect, analyze and examine digital evidences. In order to assist proof capacity of digital evidences in the court, we have to authenticate the \"integrity\", \"consistency\" and \"precision\" of the digital evidences.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"17 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Research on Comparison and Analysis of the DEFSOP, NIST Cell SOP, and ISO27037 SOP\",\"authors\":\"I. Lin, Yun-Sheng Yen, Fang-Yie Leu\",\"doi\":\"10.1109/IMIS.2014.74\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In recent years, Information and Communication Technology (ICT) has developed rapidly, and smart phones have become very important communication tools in the modern world. Because smart phones contain copious personal information and have high mobility and powerful hardware, crimes involving smart phones have increased rapidly. There are many types of modus operandi that are increasing, and smart phones have become one of the highly technical tools used to commit a crime. In view of this, our research will discuss Smart-Phone Digital Evidence Forensics Standard Operating Procedure (Smart-Phone DEFSOP) which was proposed by Prof. I-Long, Lin. Our research will compare with the SOP which was proposed by National Institute of Standards and Technology (NIST) cell SOP, and ISO27037. Finally, we will use trusted third party forensics tools to collect, analyze and examine digital evidences. In order to assist proof capacity of digital evidences in the court, we have to authenticate the \\\"integrity\\\", \\\"consistency\\\" and \\\"precision\\\" of the digital evidences.\",\"PeriodicalId\":345694,\"journal\":{\"name\":\"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing\",\"volume\":\"17 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-07-02\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IMIS.2014.74\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IMIS.2014.74","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

摘要

近年来,信息通信技术(ICT)发展迅速,智能手机已经成为现代社会非常重要的通信工具。由于智能手机包含了丰富的个人信息,并且具有高移动性和强大的硬件,涉及智能手机的犯罪迅速增加。有许多类型的作案手法正在增加,智能手机已经成为用于犯罪的高技术工具之一。鉴于此,我们的研究将讨论由林一龙教授提出的智能手机数字证据取证标准操作程序(Smart-Phone DEFSOP)。我们的研究将与美国国家标准与技术研究院(NIST) cell SOP提出的SOP和ISO27037进行比较。最后,我们将使用可信的第三方取证工具来收集、分析和检查数字证据。为了辅助数字证据在法庭上的证明能力,我们必须对数字证据的“完整性”、“一致性”和“准确性”进行认证。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Research on Comparison and Analysis of the DEFSOP, NIST Cell SOP, and ISO27037 SOP
In recent years, Information and Communication Technology (ICT) has developed rapidly, and smart phones have become very important communication tools in the modern world. Because smart phones contain copious personal information and have high mobility and powerful hardware, crimes involving smart phones have increased rapidly. There are many types of modus operandi that are increasing, and smart phones have become one of the highly technical tools used to commit a crime. In view of this, our research will discuss Smart-Phone Digital Evidence Forensics Standard Operating Procedure (Smart-Phone DEFSOP) which was proposed by Prof. I-Long, Lin. Our research will compare with the SOP which was proposed by National Institute of Standards and Technology (NIST) cell SOP, and ISO27037. Finally, we will use trusted third party forensics tools to collect, analyze and examine digital evidences. In order to assist proof capacity of digital evidences in the court, we have to authenticate the "integrity", "consistency" and "precision" of the digital evidences.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Multi-defense Mechanism against DDoS in SDN Based CDNi Extending the EPCIS with Building Automation Systems: A New Information System for the Internet of Things A Survey of Green, Energy-Aware Security and Some of Its Recent Developments in Networking and Mobile Computing A Dual-Path-Based Data Aggregation Scheme for Grid-Based Wireless Sensor Networks Minimum Cost Content Object Reconstruction in Multi-tier Servers
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1