Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "digital forensics" wg kryterium: Temat


Wyświetlanie 1-9 z 9
Tytuł:
Informatyka kryminalistyczna w kontekście usług przechowywania danych w chmurze obliczeniowej
Digital forensics in the context of cloud computing data storage services
Autorzy:
Olber, Paweł
Powiązania:
https://bibliotekanauki.pl/articles/23050946.pdf
Data publikacji:
2021
Wydawca:
Centralne Laboratorium Kryminalistyczne Policji
Tematy:
chmura obliczeniowa
dysk wirtualny
informatyka kryminalistyczna
badania informatyczne
computing cloud
file hosting service
digital forensics
IT examinations
Opis:
Rola i możliwości informatyki kryminalistycznej w środowisku chmury obliczeniowej nadal pozostają nierozwiązanym i niedostatecznie zbadanym obszarem badań naukowych. Rosnąca popularność usług przechowywania danych w chmurze sprawia, że zabezpieczanie dowodów zlokalizowanych w Internecie stanowi jedno z wyzwań informatyki kryminalistycznej. Istniejące bariery prawne w większości przypadków uniemożliwiają uzyskiwanie bezpośredniego dostępu do zasobów w chmurze w celu zabezpieczenia danych. W wielu sytuacjach wymagana jest pomoc zagranicznych organów ścigania i wymiaru sprawiedliwości. Uzasadnieniem podjęcia współpracy międzynarodowej mogą być ustalenia dokonywane w ramach kryminalistycznych badań informatycznych, które pozwalają na odtworzenie aktywności użytkownika w zakresie korzystania z usług przechowywania danych w chmurze obliczeniowej. Istotna jest więc znajomość potencjalnych źródeł informacji, umożliwiających odtworzenie aktywności użytkownika usług chmur obliczeniowych, a także świadomość aktualnego stanu wiedzy i badań naukowych w tym zakresie.
The role and capabilities of digital forensics in the cloud computing environment still remain an unsolved and insufficiently explored scientific area. The growing popularity of cloud-based data storage services makes recovery of evidence on the Internet a major challenge for forensic IT exminers. Existing legal barriers in most cases prevent direct access to cloud stored resources for the purpose of recovering data. In many situations, assistance from foreign law enforcement and judicial authorities is required. Findings made during forensic IT analysis that allow reconstructing user’s activities and indicate the act of taking advantage of cloud computing data storage is a justification for undertaking nternational cooperation. Therefore, it is important to know potential sources of information that enable the reconstruction of the activity of the user in cloud computing services, as well as the awareness of the current state of knowledge and scientific research in this field.
Źródło:
Problemy Kryminalistyki; 2021, 312; 17-24(pol), 53-60(eng)
0552-2153
Pojawia się w:
Problemy Kryminalistyki
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Methods of Time-Frequency Analysis in Authentication of Digital Audio Recordings
Autorzy:
Korycki, R.
Powiązania:
https://bibliotekanauki.pl/articles/226798.pdf
Data publikacji:
2010
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
tampering detection
audio authenticity analysis
media authentication
electric network frequency
time-frequency analysis
digital audio forensics
inverse decoder
MP3
compressed audio
perceptual audio coding
Opis:
This paper describes the problem of tampering detection and discusses the main methods used for authenticity analysis of digital audio recordings. For the first topic, two frequency measurement algorithms based on electric network frequency criterion are applied. Time-frequency analysis is used and improved with reassignment method for purpose of visual inspection of modified recordings. The algorithms are shortly described and exemplary plots are presented with interpretation. The last described method, recently proposed, is based on checking frame offsets in compressed audio files.
Źródło:
International Journal of Electronics and Telecommunications; 2010, 56, 3; 257-262
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Email forensic tools : A roadmap to email header analysis through a cybercrime use case
Autorzy:
Charalambou, E.
Bratskas, R.
Karkas, G.
Anastasiades, A.
Powiązania:
https://bibliotekanauki.pl/articles/2069104.pdf
Data publikacji:
2016
Wydawca:
Uniwersytet Morski w Gdyni. Polskie Towarzystwo Bezpieczeństwa i Niezawodności
Tematy:
email forensics
cybercrime
digital forensic tools
digital crime
Opis:
Email is one of the primary sources of numerous criminal activities, on the Internet, of which some threaten human lives. Email analysis is challenging due to not only various fields that can be forged by hackers or the wide range email applications in use, but also due to imposed law restrictions in the analysis of email body. Despite this being a relatively new area, a number of both open source and proprietary forensic tools, with varying possibilities and versatility, have been developed aiding use by practitioners. In this paper, we review existing email forensic tools for email header analysis, as part of email investigation, with emphasis on aspects related to online crime while still considering legal constraints. Through our analysis, we investigate a common case of cybercrime and examine the breadth of information one may gain solely through email forensics analysis. Additionally, a roadmap for email forensic analysis is presented, combining features and functionality already available, to assist the process of digital forensic analysis.
Źródło:
Journal of Polish Safety and Reliability Association; 2016, 7, 1; 21--28
2084-5316
Pojawia się w:
Journal of Polish Safety and Reliability Association
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Methods to acquisition digital evidence for computer forensics
Autorzy:
Pilski, Marek
Powiązania:
https://bibliotekanauki.pl/articles/2175157.pdf
Data publikacji:
2022
Wydawca:
Uniwersytet Przyrodniczo-Humanistyczny w Siedlcach
Tematy:
securing evidence material
acquisition
digital evidence
computer forensics
Opis:
Computer forensics is a key science and competency in meeting the growing risks of cybercrime, as well as for criminal investigation generally. In order to provide irrefutable evidence of a potential crime, a specialist in the incident response team (e.g. an IT forensics specialist) must secure the digital evidence in accordance with the correct procedure. There are no strict guidelines on how to do this. It is known that the authenticity and fidelity of data must be preserved. This article will collect good practices developed by specialists in the field of computer forensics. The process of securing the evidence material from a digital data sources for later analysis will be presented.
Źródło:
Studia Informatica : systems and information technology; 2022, 1(26); 73--84
1731-2264
Pojawia się w:
Studia Informatica : systems and information technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Artificial intelligence and future crime in the context of computer forensics
Autorzy:
Olber, Paweł
Powiązania:
https://bibliotekanauki.pl/articles/45491957.pdf
Data publikacji:
2023-07-25
Wydawca:
Akademia Policji w Szczytnie
Tematy:
machine learning
computer forensics
digital evidence
crime
forensic science
artificial intelligence
Opis:
The aim of this article is to discuss the role, tasks and challenges of computer forensics in the context of the development of AI-enabled crime. The issues described in the article refer to potential future threats that have been identifi ed as the most troublesome for society. The considerations in the article are preceded by a critical analysis of the research that has been conducted in the fi eld of artifi cial intelligence and computer forensics so far. The literature analysis allows the claim that the future of computer forensics is automation based on machine learning algorithms. It has also been concluded that the development of artifi cial intelligence will defi ne new areas of computer forensics that take into account the analysis of neural network models and learning datasets.
Źródło:
Przegląd Policyjny; 2023, 149(1); 342-358
0867-5708
Pojawia się w:
Przegląd Policyjny
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
The European Investigation Order as a mechanism for international cooperation in criminal cases to combat cybercrime
Autorzy:
OLBER, PAWEŁ
Powiązania:
https://bibliotekanauki.pl/articles/1804610.pdf
Data publikacji:
2020-07-17
Wydawca:
Wyższa Szkoła Policji w Szczytnie
Tematy:
European Investigation Order
digital evidence
cybercrime
computer forensics
international cooperation
Armaged0n
Opis:
The fi ght against cybercrime requires effective and rapid solutions for the collection of digital evidence at the international level. An example of such an instrument is the European Investigation Order, which introduces a comprehensive system for obtaining evidence in cross-border cases. The legislation on this solution is contained in directive 2014/41/EU of the European Parliament and of the Council of 3 April 2014 on the European Investigation Order in criminal matters. The above regulations have been implemented into the Polish national law by the Act of 10 January 2018 amending the Act — The Code of Criminal Procedure and certain other acts. The European Investigation Order was presumably fi rst used by Polish law enforcement authorities in a case involving cybercrimes committed by a person using the aliases Thomas and Armaged0n. The use of this investigation measure made it possible to apprehend the offender many years after the fi rst offence was committed and the offender was identifi ed49. Despite this success, further changes to the European Investigation Order in national legislation are needed to improve the effectiveness of the fi ght against cybercrime. It should be proposed to modify the Prosecution Services’ Rules of Procedure as regards the authorities competent to issue European Investigation Orders. Currently, the authorities executing the European Investigation Order in Poland at the stage of preparatory proceedings are district prosecutor’s offi ces, whereas such powers should be vested in every prosecutor conducting preparatory proceedings.
Źródło:
Przegląd Policyjny; 2020, 137(1); 174-187
0867-5708
Pojawia się w:
Przegląd Policyjny
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Dawn Raids and the Role of Forensic IT in Antitrust Investigations
Autorzy:
Polański, Jan
Powiązania:
https://bibliotekanauki.pl/articles/2158990.pdf
Data publikacji:
2020-09-30
Wydawca:
Uniwersytet Warszawski. Wydawnictwo Naukowe Wydziału Zarządzania
Tematy:
computer forensics
dawn raids
digital investigation
due process
evidence
forensic IT
inspections
searches
Opis:
While digital markets attract much attention of the antitrust community, important developments also take place in relation to the way antitrust investigations are handled and evidence is preserved. More and more enforcement actions of antitrust authorities rely on the ability to find and preserve digital evidence of an illegal activity. This article focuses on recent case law developments in relation to the approach to forensic IT in antitrust enforcement and investigates whether enough leeway is left to the antitrust authorities to properly discharge their powers. The article focuses on the procedural developments at the EU level and in one EU national jurisdiction, i.e. Poland. The article concludes that the current approach to forensics in antitrust does not allow to use available capabilities to a full extent. A proposal is made for an alternative approach, which would benefit effective antitrust enforcement and due process.
Si les marchés numériques suscitent une grande attention de la part de la communauté antitrust, des évolutions importantes ont également lieu en ce qui concerne la manière dont les enquêtes antitrust sont menées et dont les preuves sont préservées. De plus en plus d’actions des autorités antitrust sont fondées sur la capacité à trouver et à préserver les preuves numériques d’une activité illégale. Le présent article se concentre sur les développements récents de la jurisprudence concernant l’approche de l’informatique juridique dans l’application de la legislation antitrust et examine si les autorités antitrust disposent d’une marge de manoeuvre suffisante pour exercer correctement leurs pouvoirs. L’article se concentre sur les développements procéduraux au niveau de l’UE et dans une juridiction nationale de l’UE, la Pologne. L’article conclut que l’approche actuelle ne permet pas d’utiliser pleinement les capacités disponibles. Une proposition est faite pour une approche alternative, qui bénéficierait d’une application efficace de la legislation antitrust et d’une procédure régulière.
Źródło:
Yearbook of Antitrust and Regulatory Studies; 2020, 13, 21; 187-218
1689-9024
2545-0115
Pojawia się w:
Yearbook of Antitrust and Regulatory Studies
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Soft computing techniques-based digital video forensics for fraud medical anomaly detection
Autorzy:
Nanda, Sunpreet Kaur
Ghai, Deepika
Ingole, P.V.
Pande, Sagar
Powiązania:
https://bibliotekanauki.pl/articles/38701161.pdf
Data publikacji:
2023
Wydawca:
Instytut Podstawowych Problemów Techniki PAN
Tematy:
smart healthcare system
medical imaging
healthcare fraud
MRI imaging
digital image forensics
object detection
YOLO architecture
customized CNN
inteligentny system opieki zdrowotnej
obrazowanie medyczne
oszustwo w służbie zdrowia
obrazowanie MRI
kryminalistyka obrazu cyfrowego
detekcja obiektów
architektura YOLO
dostosowanie CNN
Opis:
The current pandemic situation has made it important for everyone to wear masks. Digital image forensics plays an important role in preventing medical fraud and in object detection. It is helpful in avoiding the high-risk situations related to the health and security of the individuals or the society, including getting the proper evidence for identifying the people who are not wearing masks. A smart system can be developed based on the proposed soft computing technique, which can be helpful to detect precisely and quickly whether a person wears a mask or not and whether he/she is carrying a gun. The proposed method gave 100% accurate results in videos used to test such situations. The system was able to precisely differentiate between those wearing a mask and those not wearing a mask. It also effectively detects guns, which can be used in many applications where security plays an important role, such as the military, banks, etc.
Źródło:
Computer Assisted Methods in Engineering and Science; 2023, 30, 2; 111-130
2299-3649
Pojawia się w:
Computer Assisted Methods in Engineering and Science
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Obtaining data located in devices or it systems — selected issues in light of the provisions of criminal procedural law
Autorzy:
Olber, Paweł
Powiązania:
https://bibliotekanauki.pl/articles/1929848.pdf
Data publikacji:
2020-04-20
Wydawca:
Wyższa Szkoła Policji w Szczytnie
Tematy:
computer forensics
digital evidence
obtaining IT data
searching the IT system
device inspection
telecommunications confi dentiality
Opis:
There is a lack of consensus among national law enforcement and judicial authorities as to which procedural acts are relevant for obtaining data contained in devices or information systems for evidentiary purposes. It is easy to fi nd supporters of the search of the information system as well as those who consider it appropriate to carry out inspections. However, regardless of many examples and arguments of various persons, it may seem that the compromise in this respect should be the position of the National Public Prosecutor’s Offi ce on the procedural practice related to obtaining data contained in IT equipment or systems for evidentiary purposes. However, the opinion of the National Prosecutor’s Offi ce does not take into account legally protected data, and in particular, legal aspects related to obtaining access to the content of telecommunications, including text messages protected by telecommunications secrecy. The article is a summary of the previous considerations regarding the possibility of obtaining data located in IT equipment or systems. The article also contains the author’s conclusions, based on, inter alia, methodology for securing digital footprints, intended for all representatives of national law enforcement and judicial authorities.
Źródło:
Przegląd Policyjny; 2019, 136(4); 193-208
0867-5708
Pojawia się w:
Przegląd Policyjny
Dostawca treści:
Biblioteka Nauki
Artykuł
    Wyświetlanie 1-9 z 9

    Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies