Advances in computer forensics in Colombia in the last four years
This research work shows, initially, how with the growth of technological advances that arise in favor of society to process, store and secure large volumes of computer data; in parallel, they become strategic tools against them, either to eliminate or alter them; according to the unscrupulous purpo...
- Autores:
- Tipo de recurso:
- http://purl.org/coar/resource_type/c_6637
- Fecha de publicación:
- 2021
- Institución:
- Universidad Pedagógica y Tecnológica de Colombia
- Repositorio:
- RiUPTC: Repositorio Institucional UPTC
- Idioma:
- spa
- OAI Identifier:
- oai:repositorio.uptc.edu.co:001/12325
- Acceso en línea:
- https://revistas.uptc.edu.co/index.php/ingenieria_sogamoso/article/view/13384
https://repositorio.uptc.edu.co/handle/001/12325
- Palabra clave:
- forensic analysis
computer forensics
chain of custody
digital evidence
cybercrime
análisis forense
informática forense
cadena de custodia
pruebas digitales
delitos informáticos
- Rights
- License
- http://purl.org/coar/access_right/c_abf138
id |
REPOUPTC2_c6c5ac4dbe57265bb4974736a0d8f1af |
---|---|
oai_identifier_str |
oai:repositorio.uptc.edu.co:001/12325 |
network_acronym_str |
REPOUPTC2 |
network_name_str |
RiUPTC: Repositorio Institucional UPTC |
repository_id_str |
|
spelling |
2021-08-312024-07-05T18:48:04Z2024-07-05T18:48:04Zhttps://revistas.uptc.edu.co/index.php/ingenieria_sogamoso/article/view/1338410.19053/1900771X.v20.n1.2020.13384https://repositorio.uptc.edu.co/handle/001/12325This research work shows, initially, how with the growth of technological advances that arise in favor of society to process, store and secure large volumes of computer data; in parallel, they become strategic tools against them, either to eliminate or alter them; according to the unscrupulous purposes of those who commit computer crimes, a growing problem that violates the confidentiality and intellect of information. Consequently, a qualitative work is carried out, in which the knowledge acquired in this research process is also recognized against the basic competences for domaining this subject. For this reason, the present study reveals an overview of how the evolution of forensic informatics has been in a research carried out among 2017 to 2020, specifying some bases, procedures and regulations, useful in the process of information retrieval and collection of digital evidence at the time of an incident; in this same sense, data are presented about the violation that some industries have had and, from this, it is evident how computer criminals act.Este trabajo de investigación expone, inicialmente, cómo con el crecimiento de los avances tecnológicos que surgen a favor de la sociedad para procesar, guardar y asegurar grandes volúmenes de datos informáticos; paralelamente, se convierten en herramientas estratégicas en su contra, ya sea para eliminarlos o alterarlos; de acuerdo con los propósitos inescrupulosos de quienes cometen los delitos informáticos, problemática creciente que vulnera la confidencia e intelecto de la información. En consecuencia, se desarrolla un trabajo cualitativo, en el cual también se reconoce los conocimientos adquiridos en este proceso de investigación frente a las competencias básicas para el dominio de esta temática. Por está razón, el presente estudio revela un panorama general acerca de cómo ha sido la evolución de la informática forense en una pesquisa hecha entre los años 2017 al 2020, especificando algunos fundamentos, procederes y normativas, útiles en el proceso de recuperación de información y recolección de evidencia digital en el momento de un incidente; en este mismo sentido, se exponen cifras acerca de la vulneración que han tenido algunas industrias y, a partir de esto, se evidencia cómo actúan los delincuentes informáticos. application/pdfspaspaUniversidad Pedagógica y Tecnológica de Colombia - UPTChttps://revistas.uptc.edu.co/index.php/ingenieria_sogamoso/article/view/13384/10880Ingeniería Investigación y Desarrollo; Vol. 20 No. 1 (2020): Enero - Junio; 69-78Ingeniería Investigación y Desarrollo; Vol. 20 Núm. 1 (2020): Enero - Junio; 69-782422-43241900-771Xforensic analysiscomputer forensicschain of custodydigital evidencecybercrimeanálisis forenseinformática forensecadena de custodiapruebas digitalesdelitos informáticosAdvances in computer forensics in Colombia in the last four yearsAvances de la informática forense en Colombia en los últimos cuatro añosinfo:eu-repo/semantics/articlehttp://purl.org/coar/resource_type/c_6637http://purl.org/coar/resource_type/c_2df8fbb1http://purl.org/coar/version/c_970fb48d4fbd8a221http://purl.org/coar/version/c_970fb48d4fbd8a85http://purl.org/coar/access_right/c_abf138http://purl.org/coar/access_right/c_abf2Bustamante Riaño, José Jhon Kennedy001/12325oai:repositorio.uptc.edu.co:001/123252025-07-18 11:25:46.273metadata.onlyhttps://repositorio.uptc.edu.coRepositorio Institucional UPTCrepositorio.uptc@uptc.edu.co |
dc.title.en-US.fl_str_mv |
Advances in computer forensics in Colombia in the last four years |
dc.title.es-ES.fl_str_mv |
Avances de la informática forense en Colombia en los últimos cuatro años |
title |
Advances in computer forensics in Colombia in the last four years |
spellingShingle |
Advances in computer forensics in Colombia in the last four years forensic analysis computer forensics chain of custody digital evidence cybercrime análisis forense informática forense cadena de custodia pruebas digitales delitos informáticos |
title_short |
Advances in computer forensics in Colombia in the last four years |
title_full |
Advances in computer forensics in Colombia in the last four years |
title_fullStr |
Advances in computer forensics in Colombia in the last four years |
title_full_unstemmed |
Advances in computer forensics in Colombia in the last four years |
title_sort |
Advances in computer forensics in Colombia in the last four years |
dc.subject.en-US.fl_str_mv |
forensic analysis computer forensics chain of custody digital evidence cybercrime |
topic |
forensic analysis computer forensics chain of custody digital evidence cybercrime análisis forense informática forense cadena de custodia pruebas digitales delitos informáticos |
dc.subject.es-ES.fl_str_mv |
análisis forense informática forense cadena de custodia pruebas digitales delitos informáticos |
description |
This research work shows, initially, how with the growth of technological advances that arise in favor of society to process, store and secure large volumes of computer data; in parallel, they become strategic tools against them, either to eliminate or alter them; according to the unscrupulous purposes of those who commit computer crimes, a growing problem that violates the confidentiality and intellect of information. Consequently, a qualitative work is carried out, in which the knowledge acquired in this research process is also recognized against the basic competences for domaining this subject. For this reason, the present study reveals an overview of how the evolution of forensic informatics has been in a research carried out among 2017 to 2020, specifying some bases, procedures and regulations, useful in the process of information retrieval and collection of digital evidence at the time of an incident; in this same sense, data are presented about the violation that some industries have had and, from this, it is evident how computer criminals act. |
publishDate |
2021 |
dc.date.accessioned.none.fl_str_mv |
2024-07-05T18:48:04Z |
dc.date.available.none.fl_str_mv |
2024-07-05T18:48:04Z |
dc.date.none.fl_str_mv |
2021-08-31 |
dc.type.none.fl_str_mv |
info:eu-repo/semantics/article |
dc.type.coar.fl_str_mv |
http://purl.org/coar/resource_type/c_2df8fbb1 |
dc.type.coarversion.fl_str_mv |
http://purl.org/coar/version/c_970fb48d4fbd8a85 |
dc.type.coar.spa.fl_str_mv |
http://purl.org/coar/resource_type/c_6637 |
dc.type.coarversion.spa.fl_str_mv |
http://purl.org/coar/version/c_970fb48d4fbd8a221 |
format |
http://purl.org/coar/resource_type/c_6637 |
dc.identifier.none.fl_str_mv |
https://revistas.uptc.edu.co/index.php/ingenieria_sogamoso/article/view/13384 10.19053/1900771X.v20.n1.2020.13384 |
dc.identifier.uri.none.fl_str_mv |
https://repositorio.uptc.edu.co/handle/001/12325 |
url |
https://revistas.uptc.edu.co/index.php/ingenieria_sogamoso/article/view/13384 https://repositorio.uptc.edu.co/handle/001/12325 |
identifier_str_mv |
10.19053/1900771X.v20.n1.2020.13384 |
dc.language.none.fl_str_mv |
spa |
dc.language.iso.none.fl_str_mv |
spa |
language |
spa |
dc.relation.none.fl_str_mv |
https://revistas.uptc.edu.co/index.php/ingenieria_sogamoso/article/view/13384/10880 |
dc.rights.coar.fl_str_mv |
http://purl.org/coar/access_right/c_abf2 |
dc.rights.coar.spa.fl_str_mv |
http://purl.org/coar/access_right/c_abf138 |
rights_invalid_str_mv |
http://purl.org/coar/access_right/c_abf138 http://purl.org/coar/access_right/c_abf2 |
dc.format.none.fl_str_mv |
application/pdf |
dc.publisher.es-ES.fl_str_mv |
Universidad Pedagógica y Tecnológica de Colombia - UPTC |
dc.source.en-US.fl_str_mv |
Ingeniería Investigación y Desarrollo; Vol. 20 No. 1 (2020): Enero - Junio; 69-78 |
dc.source.es-ES.fl_str_mv |
Ingeniería Investigación y Desarrollo; Vol. 20 Núm. 1 (2020): Enero - Junio; 69-78 |
dc.source.none.fl_str_mv |
2422-4324 1900-771X |
institution |
Universidad Pedagógica y Tecnológica de Colombia |
repository.name.fl_str_mv |
Repositorio Institucional UPTC |
repository.mail.fl_str_mv |
repositorio.uptc@uptc.edu.co |
_version_ |
1839633839135129600 |