Computer technique for the suitability of digital evidence in attacking an information system: Forensic analysis for the digital custody chain

This article presents results of a research project that attempted to create a model of forensics in an information system; since forensic analysis allows to establish the causes of security commitment information system. The aim of the study was to determine the software tools to be used in the man...

Full description

Autores:
JACOME , NAYDU J
Villamizar Nuñez, C
Tipo de recurso:
Article of journal
Fecha de publicación:
2019
Institución:
Universidad Francisco de Paula Santander
Repositorio:
Repositorio Digital UFPS
Idioma:
eng
OAI Identifier:
oai:repositorio.ufps.edu.co:ufps/657
Acceso en línea:
http://repositorio.ufps.edu.co/handle/ufps/657
https://doi.org/10.1088/1742-6596/1388/1/012027
Palabra clave:
Rights
openAccess
License
Content from this work may be used under the terms of the Creative Commons Attribution 3.0 licence.
Description
Summary:This article presents results of a research project that attempted to create a model of forensics in an information system; since forensic analysis allows to establish the causes of security commitment information system. The aim of the study was to determine the software tools to be used in the management of security incidents in an information system; required for the design of computer art for extracting digital evidence to anchor the chain of custody items. The research methodology was descriptive and applied document type, by analyzing the different tools technique that allows maintenance of digital evidence was designed, preserving the integrity of this as a test mechanism in a judicial process. In this way, the procedures to be performed to store information were established without being altered chain of custody solving the above questions: What is the chronological order in which the events of alteration, transmission or access occurred? What evidence have to believe you are a victim?, what are the damages incurred?, who do responsible for the incident?, what people are suspicious of the event?, who has investigated the incident and which actions has taken to preserve, identify, collect and analyze the data involved?; ensuring this way through technical steps and tools to be used for the preservation of the chain of custody, as an evidence in a court case.