首页 | 本学科首页   官方微博 | 高级检索  
     

通信网络中犯罪行为的取证技术
引用本文:王永全. 通信网络中犯罪行为的取证技术[J]. 电信科学, 2006, 22(6): 63-66
作者姓名:王永全
作者单位:华东政法学院信息科学技术学院,上海,200042
摘    要:随着信息技术的不断发展和计算机网络的广泛运用,危害通信网络与信息安全的犯罪活动也日趋增多,因此,计算机取证逐渐成为人们关注与研究的焦点.计算机取证研究如何为调查计算机犯罪提供彻底、有效和安全的技术以及程序和方法,其关键在于确保证据的真实、可靠、完整和合法(符合法律法规以及司法程序的规定和要求).本文对通信网络中犯罪行为的计算机取证技术进行了较为详细的分析和研究.

关 键 词:计算机取证  数据挖掘  数据恢复  静态分析  动态检测
收稿时间:2006-05-20
修稿时间:2006-05-20

Computer Forensics Technology of Criminal Activities in Communication Networks
Wang Yongquan. Computer Forensics Technology of Criminal Activities in Communication Networks[J]. Telecommunications Science, 2006, 22(6): 63-66
Authors:Wang Yongquan
Affiliation:School of Information Science and Technology, East China University of Politics and Law, Shanghai 200042, China
Abstract:With the development of information technology and the widely application of computer networks, the criminal activities of damaging communication networks and information security have risen, and thus computer forensics has become a new focus. Computer forensics is a technology field that attempt to provide thorough, efficient, secure means and program methods to investigate computer crime, the key is to ensure that computer evidence must be authentic, accurate, complete, and convincing to juries. In this paper, the technologies and methods of computer forensics of criminal activities in communication networks have been discussed and analyzed with much more detail.
Keywords:computer forensic   data mining   data recovery   static analysis   dynamic detection
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号