首页 | 本学科首页   官方微博 | 高级检索  
     

浅析计算机犯罪取证与反取证
引用本文:王彩玲,陈贺明. 浅析计算机犯罪取证与反取证[J]. 吉林公安高等专科学校学报, 2007, 22(2): 13-15
作者姓名:王彩玲  陈贺明
作者单位:河南公安高等专科学校,河南,郑州,450002;河南广播电视大学,河南,郑州,450002
摘    要:计算机犯罪取证主要围绕证据的获取和证据的分析。主要过程包括保护和勘查现场、获取物理数据、分析数据、追踪源头、提交结果等。计算机反取证就是删除或者隐藏入侵证据,使取证工作无效。反取证技术主要有数据擦除、数据隐藏等,数据擦除是最有效的反取证方法。从取证与反取证两方面分析计算机犯罪的特征,研究反取证技术的根源,可有效地保护国家信息网络安全,打击犯罪。

关 键 词:计算机犯罪  取证  反取证  数据擦除  国家信息  网络安全

On Computer Crime Forensics and Anti-Forensics
Wang Cailing,Chen Heming. On Computer Crime Forensics and Anti-Forensics[J]. Journal of Jilin Public Secunity Academy, 2007, 22(2): 13-15
Authors:Wang Cailing  Chen Heming
Affiliation:Wang Cailing, Chen Heming (Henan Public Security Academy, Zhengzhou , Henan Province, 450002; Henan Radio and TV University, Zhengzhou City, Henan Province, 450002)
Abstract:Computer crime forensics is mainly on the testimony gain and analysis. Its process consists of spot protection and investigation, physical data gain, data analysis, tracing origin, putting in result. Computer anti- forensics makes the forensics ineffectively through deletion or hiding. Thereinto data deletion is a most effective way. Analyzing computer crime through forensics and anti-forensics, we should find out the origin of anti-forensics to protect national information network security and beat crime.
Keywords:computer crime   forensics   anti-forensics   data deletion   national information   network security
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号