Advances in computer forensics in Colombia in the last four years

This research work shows, initially, how with the growth of technological advances that arise in favor of society to process, store and secure large volumes of computer data; in parallel, they become strategic tools against them, either to eliminate or alter them; according to the unscrupulous purpo...

Full description

Autores:
Tipo de recurso:
http://purl.org/coar/resource_type/c_6637
Fecha de publicación:
2021
Institución:
Universidad Pedagógica y Tecnológica de Colombia
Repositorio:
RiUPTC: Repositorio Institucional UPTC
Idioma:
spa
OAI Identifier:
oai:repositorio.uptc.edu.co:001/12325
Acceso en línea:
https://revistas.uptc.edu.co/index.php/ingenieria_sogamoso/article/view/13384
https://repositorio.uptc.edu.co/handle/001/12325
Palabra clave:
forensic analysis
computer forensics
chain of custody
digital evidence
cybercrime
análisis forense
informática forense
cadena de custodia
pruebas digitales
delitos informáticos
Rights
License
http://purl.org/coar/access_right/c_abf138
Description
Summary:This research work shows, initially, how with the growth of technological advances that arise in favor of society to process, store and secure large volumes of computer data; in parallel, they become strategic tools against them, either to eliminate or alter them; according to the unscrupulous purposes of those who commit computer crimes, a growing problem that violates the confidentiality and intellect of information. Consequently, a qualitative work is carried out, in which the knowledge acquired in this research process is also recognized against the basic competences for domaining this subject. For this reason, the present study reveals an overview of how the evolution of forensic informatics has been in a research carried out among 2017 to 2020, specifying some bases, procedures and regulations, useful in the process of information retrieval and collection of digital evidence at the time of an incident; in this same sense, data are presented about the violation that some industries have had and, from this, it is evident how computer criminals act.