{"title":"DEFSOP、NIST Cell SOP、ISO27037 SOP的比较分析研究","authors":"I. Lin, Yun-Sheng Yen, Fang-Yie Leu","doi":"10.1109/IMIS.2014.74","DOIUrl":null,"url":null,"abstract":"In recent years, Information and Communication Technology (ICT) has developed rapidly, and smart phones have become very important communication tools in the modern world. Because smart phones contain copious personal information and have high mobility and powerful hardware, crimes involving smart phones have increased rapidly. There are many types of modus operandi that are increasing, and smart phones have become one of the highly technical tools used to commit a crime. In view of this, our research will discuss Smart-Phone Digital Evidence Forensics Standard Operating Procedure (Smart-Phone DEFSOP) which was proposed by Prof. I-Long, Lin. Our research will compare with the SOP which was proposed by National Institute of Standards and Technology (NIST) cell SOP, and ISO27037. Finally, we will use trusted third party forensics tools to collect, analyze and examine digital evidences. In order to assist proof capacity of digital evidences in the court, we have to authenticate the \"integrity\", \"consistency\" and \"precision\" of the digital evidences.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"17 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Research on Comparison and Analysis of the DEFSOP, NIST Cell SOP, and ISO27037 SOP\",\"authors\":\"I. Lin, Yun-Sheng Yen, Fang-Yie Leu\",\"doi\":\"10.1109/IMIS.2014.74\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In recent years, Information and Communication Technology (ICT) has developed rapidly, and smart phones have become very important communication tools in the modern world. Because smart phones contain copious personal information and have high mobility and powerful hardware, crimes involving smart phones have increased rapidly. There are many types of modus operandi that are increasing, and smart phones have become one of the highly technical tools used to commit a crime. In view of this, our research will discuss Smart-Phone Digital Evidence Forensics Standard Operating Procedure (Smart-Phone DEFSOP) which was proposed by Prof. I-Long, Lin. Our research will compare with the SOP which was proposed by National Institute of Standards and Technology (NIST) cell SOP, and ISO27037. Finally, we will use trusted third party forensics tools to collect, analyze and examine digital evidences. In order to assist proof capacity of digital evidences in the court, we have to authenticate the \\\"integrity\\\", \\\"consistency\\\" and \\\"precision\\\" of the digital evidences.\",\"PeriodicalId\":345694,\"journal\":{\"name\":\"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing\",\"volume\":\"17 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-07-02\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IMIS.2014.74\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IMIS.2014.74","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Research on Comparison and Analysis of the DEFSOP, NIST Cell SOP, and ISO27037 SOP
In recent years, Information and Communication Technology (ICT) has developed rapidly, and smart phones have become very important communication tools in the modern world. Because smart phones contain copious personal information and have high mobility and powerful hardware, crimes involving smart phones have increased rapidly. There are many types of modus operandi that are increasing, and smart phones have become one of the highly technical tools used to commit a crime. In view of this, our research will discuss Smart-Phone Digital Evidence Forensics Standard Operating Procedure (Smart-Phone DEFSOP) which was proposed by Prof. I-Long, Lin. Our research will compare with the SOP which was proposed by National Institute of Standards and Technology (NIST) cell SOP, and ISO27037. Finally, we will use trusted third party forensics tools to collect, analyze and examine digital evidences. In order to assist proof capacity of digital evidences in the court, we have to authenticate the "integrity", "consistency" and "precision" of the digital evidences.