Computer forensics: A systematic review of the literature
DOI:
https://doi.org/10.33936/rehuso.v4i2.1641Keywords:
impact; virtual environment; context; teaching; pedagogical model.Abstract
Forensic computer science studies and analyzes a wide range of evidence of crimes, so the IT forensic scientist requires a deep technical knowledge and management of specialized tools. The current work presents a systematic review whose objective was to know the computer systems used in this science and the technological components that are most analyzed. Scientifically evaluated forensic solutions are exposed, used for examinations in hardware and software, either through own or commercial developments, applied specifically to computers, networks, digital devices and information in the cloud; In addition, proposals for models of reliability of analyzed evidence are deployed, so that the computer forensic expert can give opinions and issue technical reports, complying with a correct forensic methodology. Commercial software that supports the work of computer forensics has the limitation that they are only directed to a specific job; therefore it is evident that there is much to develop in applications for this activity. Other results found that the legal area and computer science are those that have predominance of applicability of this science.
Downloads
References
Bubulan, C. (2015). Digital Forensics Capabilities in an Open Source Framework. Journal of Mobile, Embedded and Distributed Systems, 1(2), 60–65.
Caviglione, L., Wendzel, S., & Mazurczyk, W. (2017). The Future of Digital Forensics: Challenges and the Road Ahead. IEEE Security & Privacy, 15(6), 12–17. doi: 10.1109/MSP.2017.4251117
Chen, L., Li, W., & Haddad, R. (2017). Special Issue on Mobile Systems, Mobile Networks, and Mobile Cloud. Security, Privacy, and Digital Forensics. Information, 8(3), 1–4. doi: 10.3390/info8030099
Cisar, P., Cisar, M., & Bosnjak, S. (2014). Cybercrime and Digital Forensics – Technologies and Approaches. En B. Katalinic (Ed.), Daaam International Scientific Book (1a ed., Vol. 13, pp. 525–542). doi: 10.2507/daaam.scibook.2014.42
Culley, A. (2003). Computer forensics: past, present and future. Information Security Technical 13(3), 32–36. doi: 10.1016/S1363-4127(03)00204-8
Fu, Z., Sun, X., & Xi, J. (2015). Digital forensics of Microsoft Office 2007–2013 documents to prevent covert communication. Journal of Communications and Networks, 17(5), 525–533. doi: 10.1109/JCN.2015.000091
Govan, M. (2014). The Application of Peer Teaching in Digital Forensics Education. Innovation in Teaching and Learning in Information and Computer Sciences, 1(1), 1–7. doi: 10.11120/ital.2014.00012
Grigaliunas, S., Toldinas, J., & Venckauskas, A. (2017). An Ontology-Based Transformation Model for the Digital Forensics Domain. Elektronika Ir Elektrotechnika, 23(3), 78–83. doi: 10.5755/j01.eie.23.3.18337
Irons, A., y Thomas, P. (2016). Problem based learning in digital forensics. Higher Education Pedagogies, 1(1), 95–105. doi: 10.1080/23752696.2015.1134200
Johnson, J., Daily, J., & Kongs, A. (2014). On the Digital Forensics of Heavy Truck Electronic Control Modules. SAE International Journal of Commercial Vehicles, 7(1), 72–88. doi: 10.4271/2014-01-0495
Kitchenham, B. (2004). Procedures for Performing Systematic Reviews. Joint Technical Report, 15(2), 1–33. Recuperado de http://www.inf.ufsc.br/~aldo.vw/kitchenham.pdf
Li, C.-T., & Lin, X. (2017). A fast source-oriented image clustering method for digital forensics. Eurasip Journal on Image and Video Processing, 20(1), 1–16. doi: 10.1186/s13640-017-0217-
Mazurczyk, W., Caviglione, L., & Wendzel, S. (2017). Recent Advancements in Digital Forensics. IEEE Security & Privacy, 15(6), 10–11. doi: 10.1109/MSP.2017.4251106
Merve, O., İbrahim, K., & Hüseyin, Ç. (2016). General Evaluation and Requirement of Computer Forensics Education. Bilişim Teknolojileri Dergisi, Cilt, 9(2), 137–146. doi: 10.17671/btd.31631
Miranda Lopez, E., Moon, S., & Park, J. (2016). Scenario-Based Digital Forensics Challenges in Cloud Computing. Symmetry, 8(10), 1–20. doi: 10.3390/sym8100107
Rajesh, K. V. N., & Ramesh, K. V. N. (2016). Computer Forensics: An Overview. I-Manager’s Journal on Software Engineering, 10(4), 1–6. doi: 10.26634/jse.10.4.6056
Sahinoglu, M., Stockton, S., Barclay, R., & Morton, S. (2016). Metrics-Based Risk Assessment and Management of Digital Forensics. Defense Acquisition Research Journal, 23(2), 152–177. doi: 10.22594/dau.16-748.23.02
Seo, J., Lee, S., & Shon, T. (2015). A study on memory dump analysis based on digital forensic tools. Peer-to-Peer Networking and Applications, 8(4), 694–703. doi: 10.1007/s12083-013-0217-3
Sridhar, N., Bhaskari, Dr. D. L., & Avadhani, Dr. P. S. (2011). Plethora of Cyber Forensics. International Journal of Advanced Computer Science and Applications, 2(11), 110–114. doi: 10.14569/IJACSA.2011.021118
Stanivukovic, D., & Randjelovic, D. (2016). Application of multiple criteria decision making in the selection of digital forensics software. Military Technical Courier, 64(4), 1083–1101. doi: 10.5937/vojtehg64-8938
Subbaraman, N. (2014). Museums go high-tech with digital forensics. Communications of the ACM, 57(10), 19–21. doi: 10.1145/2659762
Syambas, N. R., & El Farisi, N. (2014). Two-Step Injection Method for Collecting Digital Evidence in Digital Forensics. Journal of ICT Research and Applications, 8(2), 141–156. doi: 10.5614/itbj.ict.res.appl.2014.8.2.5
Varol, A. (2017). Review of Evidence Collection and Protection Phases in Digital Forensics Process. International Journal Of Information Security Science, 6(6), 39–47. Recuperado de https://www.ijiss.org/ijiss/index.php/ijiss/article/view/267/pdf_49
Vincze, E. A. (2016). Challenges in digital forensics. Police Practice and Research, 17(2), 183–194. doi: 10.1080/15614263.2015.1128163
Yasin, M., Qureshi, J. A., Kausar, F., Kim, J., & Seo, J. (2015). A granular approach for user-centric network analysis to identify digital evidence. Peer-to-Peer Networking and Applications, 8(5), 911–924. doi: 10.1007/s12083-014-0250-x
Zawoad, S., & Hasan, R. (2016). Trustworthy Digital Forensics in the Cloud. Computer, 49(3), 78–81. doi: 10.1109/MC.2016.89