Computer forensics: A systematic review of the literature

Authors

  • Marcos Antonio Espinoza Mina Universidad Ecotec - Ecuador

DOI:

https://doi.org/10.33936/rehuso.v4i2.1641

Keywords:

impact; virtual environment; context; teaching; pedagogical model.

Abstract

Forensic computer science studies and analyzes a wide range of evidence of crimes, so the IT forensic scientist requires a deep technical knowledge and management of specialized tools. The current work presents a systematic review whose objective was to know the computer systems used in this science and the technological components that are most analyzed. Scientifically evaluated forensic solutions are exposed, used for examinations in hardware and software, either through own or commercial developments, applied specifically to computers, networks, digital devices and information in the cloud; In addition, proposals for models of reliability of analyzed evidence are deployed, so that the computer forensic expert can give opinions and issue technical reports, complying with a correct forensic methodology. Commercial software that supports the work of computer forensics has the limitation that they are only directed to a specific job; therefore it is evident that there is much to develop in applications for this activity. Other results found that the legal area and computer science are those that have predominance of applicability of this science.

Downloads

Download data is not yet available.

References

Bem, D., Feld, F., Huebner, E., & Bem, O. (2008). Computer Forensics - Past, Present and Future. Journal of Information Science and Technology, 4(2), 1–18. Recuperado de http://www.cis.gsu.edu/rbaskerville/cis8630/Bernetal2008.pdf

Bubulan, C. (2015). Digital Forensics Capabilities in an Open Source Framework. Journal of Mobile, Embedded and Distributed Systems, 1(2), 60–65.

Caviglione, L., Wendzel, S., & Mazurczyk, W. (2017). The Future of Digital Forensics: Challenges and the Road Ahead. IEEE Security & Privacy, 15(6), 12–17. doi: 10.1109/MSP.2017.4251117

Chen, L., Li, W., & Haddad, R. (2017). Special Issue on Mobile Systems, Mobile Networks, and Mobile Cloud. Security, Privacy, and Digital Forensics. Information, 8(3), 1–4. doi: 10.3390/info8030099

Cisar, P., Cisar, M., & Bosnjak, S. (2014). Cybercrime and Digital Forensics – Technologies and Approaches. En B. Katalinic (Ed.), Daaam International Scientific Book (1a ed., Vol. 13, pp. 525–542). doi: 10.2507/daaam.scibook.2014.42

Culley, A. (2003). Computer forensics: past, present and future. Information Security Technical 13(3), 32–36. doi: 10.1016/S1363-4127(03)00204-8

Fu, Z., Sun, X., & Xi, J. (2015). Digital forensics of Microsoft Office 2007–2013 documents to prevent covert communication. Journal of Communications and Networks, 17(5), 525–533. doi: 10.1109/JCN.2015.000091

Govan, M. (2014). The Application of Peer Teaching in Digital Forensics Education. Innovation in Teaching and Learning in Information and Computer Sciences, 1(1), 1–7. doi: 10.11120/ital.2014.00012

Grigaliunas, S., Toldinas, J., & Venckauskas, A. (2017). An Ontology-Based Transformation Model for the Digital Forensics Domain. Elektronika Ir Elektrotechnika, 23(3), 78–83. doi: 10.5755/j01.eie.23.3.18337

Irons, A., y Thomas, P. (2016). Problem based learning in digital forensics. Higher Education Pedagogies, 1(1), 95–105. doi: 10.1080/23752696.2015.1134200

Johnson, J., Daily, J., & Kongs, A. (2014). On the Digital Forensics of Heavy Truck Electronic Control Modules. SAE International Journal of Commercial Vehicles, 7(1), 72–88. doi: 10.4271/2014-01-0495

Kitchenham, B. (2004). Procedures for Performing Systematic Reviews. Joint Technical Report, 15(2), 1–33. Recuperado de http://www.inf.ufsc.br/~aldo.vw/kitchenham.pdf

Li, C.-T., & Lin, X. (2017). A fast source-oriented image clustering method for digital forensics. Eurasip Journal on Image and Video Processing, 20(1), 1–16. doi: 10.1186/s13640-017-0217-

Mazurczyk, W., Caviglione, L., & Wendzel, S. (2017). Recent Advancements in Digital Forensics. IEEE Security & Privacy, 15(6), 10–11. doi: 10.1109/MSP.2017.4251106

Merve, O., İbrahim, K., & Hüseyin, Ç. (2016). General Evaluation and Requirement of Computer Forensics Education. Bilişim Teknolojileri Dergisi, Cilt, 9(2), 137–146. doi: 10.17671/btd.31631

Miranda Lopez, E., Moon, S., & Park, J. (2016). Scenario-Based Digital Forensics Challenges in Cloud Computing. Symmetry, 8(10), 1–20. doi: 10.3390/sym8100107

Rajesh, K. V. N., & Ramesh, K. V. N. (2016). Computer Forensics: An Overview. I-Manager’s Journal on Software Engineering, 10(4), 1–6. doi: 10.26634/jse.10.4.6056

Sahinoglu, M., Stockton, S., Barclay, R., & Morton, S. (2016). Metrics-Based Risk Assessment and Management of Digital Forensics. Defense Acquisition Research Journal, 23(2), 152–177. doi: 10.22594/dau.16-748.23.02

Seo, J., Lee, S., & Shon, T. (2015). A study on memory dump analysis based on digital forensic tools. Peer-to-Peer Networking and Applications, 8(4), 694–703. doi: 10.1007/s12083-013-0217-3

Sridhar, N., Bhaskari, Dr. D. L., & Avadhani, Dr. P. S. (2011). Plethora of Cyber Forensics. International Journal of Advanced Computer Science and Applications, 2(11), 110–114. doi: 10.14569/IJACSA.2011.021118

Stanivukovic, D., & Randjelovic, D. (2016). Application of multiple criteria decision making in the selection of digital forensics software. Military Technical Courier, 64(4), 1083–1101. doi: 10.5937/vojtehg64-8938

Subbaraman, N. (2014). Museums go high-tech with digital forensics. Communications of the ACM, 57(10), 19–21. doi: 10.1145/2659762

Syambas, N. R., & El Farisi, N. (2014). Two-Step Injection Method for Collecting Digital Evidence in Digital Forensics. Journal of ICT Research and Applications, 8(2), 141–156. doi: 10.5614/itbj.ict.res.appl.2014.8.2.5

Varol, A. (2017). Review of Evidence Collection and Protection Phases in Digital Forensics Process. International Journal Of Information Security Science, 6(6), 39–47. Recuperado de https://www.ijiss.org/ijiss/index.php/ijiss/article/view/267/pdf_49

Vincze, E. A. (2016). Challenges in digital forensics. Police Practice and Research, 17(2), 183–194. doi: 10.1080/15614263.2015.1128163

Yasin, M., Qureshi, J. A., Kausar, F., Kim, J., & Seo, J. (2015). A granular approach for user-centric network analysis to identify digital evidence. Peer-to-Peer Networking and Applications, 8(5), 911–924. doi: 10.1007/s12083-014-0250-x

Zawoad, S., & Hasan, R. (2016). Trustworthy Digital Forensics in the Cloud. Computer, 49(3), 78–81. doi: 10.1109/MC.2016.89

Published

2019-05-03