Advances in computer forensics in Colombia in the last four years

This research work shows, initially, how with the growth of technological advances that arise in favor of society to process, store and secure large volumes of computer data; in parallel, they become strategic tools against them, either to eliminate or alter them; according to the unscrupulous purpo...

Full description

Autores:
Tipo de recurso:
http://purl.org/coar/resource_type/c_6637
Fecha de publicación:
2021
Institución:
Universidad Pedagógica y Tecnológica de Colombia
Repositorio:
RiUPTC: Repositorio Institucional UPTC
Idioma:
spa
OAI Identifier:
oai:repositorio.uptc.edu.co:001/12325
Acceso en línea:
https://revistas.uptc.edu.co/index.php/ingenieria_sogamoso/article/view/13384
https://repositorio.uptc.edu.co/handle/001/12325
Palabra clave:
forensic analysis
computer forensics
chain of custody
digital evidence
cybercrime
análisis forense
informática forense
cadena de custodia
pruebas digitales
delitos informáticos
Rights
License
http://purl.org/coar/access_right/c_abf138
id REPOUPTC2_c6c5ac4dbe57265bb4974736a0d8f1af
oai_identifier_str oai:repositorio.uptc.edu.co:001/12325
network_acronym_str REPOUPTC2
network_name_str RiUPTC: Repositorio Institucional UPTC
repository_id_str
spelling 2021-08-312024-07-05T18:48:04Z2024-07-05T18:48:04Zhttps://revistas.uptc.edu.co/index.php/ingenieria_sogamoso/article/view/1338410.19053/1900771X.v20.n1.2020.13384https://repositorio.uptc.edu.co/handle/001/12325This research work shows, initially, how with the growth of technological advances that arise in favor of society to process, store and secure large volumes of computer data; in parallel, they become strategic tools against them, either to eliminate or alter them; according to the unscrupulous purposes of those who commit computer crimes, a growing problem that violates the confidentiality and intellect of information. Consequently, a qualitative work is carried out, in which the knowledge acquired in this research process is also recognized against the basic competences for domaining this subject. For this reason, the present study reveals an overview of how the evolution of forensic informatics has been in a research carried out among 2017 to 2020, specifying some bases, procedures and regulations, useful in the process of information retrieval and collection of digital evidence at the time of an incident; in this same sense, data are presented about the violation that some industries have had and, from this, it is evident how computer criminals act.Este trabajo de investigación expone, inicialmente, cómo con el crecimiento de los avances tecnológicos que surgen a favor de la sociedad para procesar, guardar y asegurar grandes volúmenes de datos informáticos; paralelamente, se convierten en herramientas estratégicas en su contra, ya sea para eliminarlos o alterarlos; de acuerdo con los propósitos inescrupulosos de quienes cometen los delitos informáticos, problemática creciente que vulnera la confidencia e intelecto de la información. En consecuencia, se desarrolla un trabajo cualitativo, en el cual también se reconoce los conocimientos adquiridos en este proceso de investigación frente a las competencias básicas para el dominio de esta temática. Por está razón, el presente estudio revela un panorama general acerca de cómo ha sido la evolución de la informática forense en una pesquisa hecha entre los años 2017 al 2020, especificando algunos fundamentos, procederes y normativas, útiles en el proceso de recuperación de información y recolección de evidencia digital en el momento de un incidente; en este mismo sentido, se exponen cifras acerca de la vulneración que han tenido algunas industrias y, a partir de esto, se evidencia cómo actúan los delincuentes informáticos. application/pdfspaspaUniversidad Pedagógica y Tecnológica de Colombia - UPTChttps://revistas.uptc.edu.co/index.php/ingenieria_sogamoso/article/view/13384/10880Ingeniería Investigación y Desarrollo; Vol. 20 No. 1 (2020): Enero - Junio; 69-78Ingeniería Investigación y Desarrollo; Vol. 20 Núm. 1 (2020): Enero - Junio; 69-782422-43241900-771Xforensic analysiscomputer forensicschain of custodydigital evidencecybercrimeanálisis forenseinformática forensecadena de custodiapruebas digitalesdelitos informáticosAdvances in computer forensics in Colombia in the last four yearsAvances de la informática forense en Colombia en los últimos cuatro añosinfo:eu-repo/semantics/articlehttp://purl.org/coar/resource_type/c_6637http://purl.org/coar/resource_type/c_2df8fbb1http://purl.org/coar/version/c_970fb48d4fbd8a221http://purl.org/coar/version/c_970fb48d4fbd8a85http://purl.org/coar/access_right/c_abf138http://purl.org/coar/access_right/c_abf2Bustamante Riaño, José Jhon Kennedy001/12325oai:repositorio.uptc.edu.co:001/123252025-07-18 11:25:46.273metadata.onlyhttps://repositorio.uptc.edu.coRepositorio Institucional UPTCrepositorio.uptc@uptc.edu.co
dc.title.en-US.fl_str_mv Advances in computer forensics in Colombia in the last four years
dc.title.es-ES.fl_str_mv Avances de la informática forense en Colombia en los últimos cuatro años
title Advances in computer forensics in Colombia in the last four years
spellingShingle Advances in computer forensics in Colombia in the last four years
forensic analysis
computer forensics
chain of custody
digital evidence
cybercrime
análisis forense
informática forense
cadena de custodia
pruebas digitales
delitos informáticos
title_short Advances in computer forensics in Colombia in the last four years
title_full Advances in computer forensics in Colombia in the last four years
title_fullStr Advances in computer forensics in Colombia in the last four years
title_full_unstemmed Advances in computer forensics in Colombia in the last four years
title_sort Advances in computer forensics in Colombia in the last four years
dc.subject.en-US.fl_str_mv forensic analysis
computer forensics
chain of custody
digital evidence
cybercrime
topic forensic analysis
computer forensics
chain of custody
digital evidence
cybercrime
análisis forense
informática forense
cadena de custodia
pruebas digitales
delitos informáticos
dc.subject.es-ES.fl_str_mv análisis forense
informática forense
cadena de custodia
pruebas digitales
delitos informáticos
description This research work shows, initially, how with the growth of technological advances that arise in favor of society to process, store and secure large volumes of computer data; in parallel, they become strategic tools against them, either to eliminate or alter them; according to the unscrupulous purposes of those who commit computer crimes, a growing problem that violates the confidentiality and intellect of information. Consequently, a qualitative work is carried out, in which the knowledge acquired in this research process is also recognized against the basic competences for domaining this subject. For this reason, the present study reveals an overview of how the evolution of forensic informatics has been in a research carried out among 2017 to 2020, specifying some bases, procedures and regulations, useful in the process of information retrieval and collection of digital evidence at the time of an incident; in this same sense, data are presented about the violation that some industries have had and, from this, it is evident how computer criminals act.
publishDate 2021
dc.date.accessioned.none.fl_str_mv 2024-07-05T18:48:04Z
dc.date.available.none.fl_str_mv 2024-07-05T18:48:04Z
dc.date.none.fl_str_mv 2021-08-31
dc.type.none.fl_str_mv info:eu-repo/semantics/article
dc.type.coar.fl_str_mv http://purl.org/coar/resource_type/c_2df8fbb1
dc.type.coarversion.fl_str_mv http://purl.org/coar/version/c_970fb48d4fbd8a85
dc.type.coar.spa.fl_str_mv http://purl.org/coar/resource_type/c_6637
dc.type.coarversion.spa.fl_str_mv http://purl.org/coar/version/c_970fb48d4fbd8a221
format http://purl.org/coar/resource_type/c_6637
dc.identifier.none.fl_str_mv https://revistas.uptc.edu.co/index.php/ingenieria_sogamoso/article/view/13384
10.19053/1900771X.v20.n1.2020.13384
dc.identifier.uri.none.fl_str_mv https://repositorio.uptc.edu.co/handle/001/12325
url https://revistas.uptc.edu.co/index.php/ingenieria_sogamoso/article/view/13384
https://repositorio.uptc.edu.co/handle/001/12325
identifier_str_mv 10.19053/1900771X.v20.n1.2020.13384
dc.language.none.fl_str_mv spa
dc.language.iso.none.fl_str_mv spa
language spa
dc.relation.none.fl_str_mv https://revistas.uptc.edu.co/index.php/ingenieria_sogamoso/article/view/13384/10880
dc.rights.coar.fl_str_mv http://purl.org/coar/access_right/c_abf2
dc.rights.coar.spa.fl_str_mv http://purl.org/coar/access_right/c_abf138
rights_invalid_str_mv http://purl.org/coar/access_right/c_abf138
http://purl.org/coar/access_right/c_abf2
dc.format.none.fl_str_mv application/pdf
dc.publisher.es-ES.fl_str_mv Universidad Pedagógica y Tecnológica de Colombia - UPTC
dc.source.en-US.fl_str_mv Ingeniería Investigación y Desarrollo; Vol. 20 No. 1 (2020): Enero - Junio; 69-78
dc.source.es-ES.fl_str_mv Ingeniería Investigación y Desarrollo; Vol. 20 Núm. 1 (2020): Enero - Junio; 69-78
dc.source.none.fl_str_mv 2422-4324
1900-771X
institution Universidad Pedagógica y Tecnológica de Colombia
repository.name.fl_str_mv Repositorio Institucional UPTC
repository.mail.fl_str_mv repositorio.uptc@uptc.edu.co
_version_ 1839633839135129600