Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "forensics" wg kryterium: Temat


Wyświetlanie 1-4 z 4
Tytuł:
Methods to acquisition digital evidence for computer forensics
Autorzy:
Pilski, Marek
Powiązania:
https://bibliotekanauki.pl/articles/2175157.pdf
Data publikacji:
2022
Wydawca:
Uniwersytet Przyrodniczo-Humanistyczny w Siedlcach
Tematy:
securing evidence material
acquisition
digital evidence
computer forensics
Opis:
Computer forensics is a key science and competency in meeting the growing risks of cybercrime, as well as for criminal investigation generally. In order to provide irrefutable evidence of a potential crime, a specialist in the incident response team (e.g. an IT forensics specialist) must secure the digital evidence in accordance with the correct procedure. There are no strict guidelines on how to do this. It is known that the authenticity and fidelity of data must be preserved. This article will collect good practices developed by specialists in the field of computer forensics. The process of securing the evidence material from a digital data sources for later analysis will be presented.
Źródło:
Studia Informatica : systems and information technology; 2022, 1(26); 73--84
1731-2264
Pojawia się w:
Studia Informatica : systems and information technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Artificial intelligence and future crime in the context of computer forensics
Autorzy:
Olber, Paweł
Powiązania:
https://bibliotekanauki.pl/articles/45491957.pdf
Data publikacji:
2023-07-25
Wydawca:
Akademia Policji w Szczytnie
Tematy:
machine learning
computer forensics
digital evidence
crime
forensic science
artificial intelligence
Opis:
The aim of this article is to discuss the role, tasks and challenges of computer forensics in the context of the development of AI-enabled crime. The issues described in the article refer to potential future threats that have been identifi ed as the most troublesome for society. The considerations in the article are preceded by a critical analysis of the research that has been conducted in the fi eld of artifi cial intelligence and computer forensics so far. The literature analysis allows the claim that the future of computer forensics is automation based on machine learning algorithms. It has also been concluded that the development of artifi cial intelligence will defi ne new areas of computer forensics that take into account the analysis of neural network models and learning datasets.
Źródło:
Przegląd Policyjny; 2023, 149(1); 342-358
0867-5708
Pojawia się w:
Przegląd Policyjny
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
The European Investigation Order as a mechanism for international cooperation in criminal cases to combat cybercrime
Autorzy:
OLBER, PAWEŁ
Powiązania:
https://bibliotekanauki.pl/articles/1804610.pdf
Data publikacji:
2020-07-17
Wydawca:
Wyższa Szkoła Policji w Szczytnie
Tematy:
European Investigation Order
digital evidence
cybercrime
computer forensics
international cooperation
Armaged0n
Opis:
The fi ght against cybercrime requires effective and rapid solutions for the collection of digital evidence at the international level. An example of such an instrument is the European Investigation Order, which introduces a comprehensive system for obtaining evidence in cross-border cases. The legislation on this solution is contained in directive 2014/41/EU of the European Parliament and of the Council of 3 April 2014 on the European Investigation Order in criminal matters. The above regulations have been implemented into the Polish national law by the Act of 10 January 2018 amending the Act — The Code of Criminal Procedure and certain other acts. The European Investigation Order was presumably fi rst used by Polish law enforcement authorities in a case involving cybercrimes committed by a person using the aliases Thomas and Armaged0n. The use of this investigation measure made it possible to apprehend the offender many years after the fi rst offence was committed and the offender was identifi ed49. Despite this success, further changes to the European Investigation Order in national legislation are needed to improve the effectiveness of the fi ght against cybercrime. It should be proposed to modify the Prosecution Services’ Rules of Procedure as regards the authorities competent to issue European Investigation Orders. Currently, the authorities executing the European Investigation Order in Poland at the stage of preparatory proceedings are district prosecutor’s offi ces, whereas such powers should be vested in every prosecutor conducting preparatory proceedings.
Źródło:
Przegląd Policyjny; 2020, 137(1); 174-187
0867-5708
Pojawia się w:
Przegląd Policyjny
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Obtaining data located in devices or it systems — selected issues in light of the provisions of criminal procedural law
Autorzy:
Olber, Paweł
Powiązania:
https://bibliotekanauki.pl/articles/1929848.pdf
Data publikacji:
2020-04-20
Wydawca:
Wyższa Szkoła Policji w Szczytnie
Tematy:
computer forensics
digital evidence
obtaining IT data
searching the IT system
device inspection
telecommunications confi dentiality
Opis:
There is a lack of consensus among national law enforcement and judicial authorities as to which procedural acts are relevant for obtaining data contained in devices or information systems for evidentiary purposes. It is easy to fi nd supporters of the search of the information system as well as those who consider it appropriate to carry out inspections. However, regardless of many examples and arguments of various persons, it may seem that the compromise in this respect should be the position of the National Public Prosecutor’s Offi ce on the procedural practice related to obtaining data contained in IT equipment or systems for evidentiary purposes. However, the opinion of the National Prosecutor’s Offi ce does not take into account legally protected data, and in particular, legal aspects related to obtaining access to the content of telecommunications, including text messages protected by telecommunications secrecy. The article is a summary of the previous considerations regarding the possibility of obtaining data located in IT equipment or systems. The article also contains the author’s conclusions, based on, inter alia, methodology for securing digital footprints, intended for all representatives of national law enforcement and judicial authorities.
Źródło:
Przegląd Policyjny; 2019, 136(4); 193-208
0867-5708
Pojawia się w:
Przegląd Policyjny
Dostawca treści:
Biblioteka Nauki
Artykuł
    Wyświetlanie 1-4 z 4

    Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies