McKemmish, 1999 - Google Patents
What is forensic computing?McKemmish, 1999
View PDF- Document ID
- 4426876030828840413
- Author
- McKemmish R
- Publication year
- Publication venue
- Trends & Issues in Crime & Criminal Justice
External Links
Snippet
Developments in information technology have begun to pose new challenges for policing. Most professions have had to adapt to the digital age, and the police profession must be particularly adaptive, because criminal exploitation of digital technologies necessitates new …
- 230000000694 effects 0 abstract description 15
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F19/00—Digital computing or data processing equipment or methods, specially adapted for specific applications
- G06F19/30—Medical informatics, i.e. computer-based analysis or dissemination of patient or disease data
- G06F19/32—Medical data management, e.g. systems or protocols for archival or communication of medical images, computerised patient records or computerised general medical references
- G06F19/322—Management of patient personal data, e.g. patient records, conversion of records or privacy aspects
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30067—File systems; File servers
- G06F17/30129—Details of further file system functionalities
- G06F17/30144—Details of monitoring file system events, e.g. by the use of hooks, filter drivers, logs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F19/00—Digital computing or data processing equipment or methods, specially adapted for specific applications
- G06F19/30—Medical informatics, i.e. computer-based analysis or dissemination of patient or disease data
- G06F19/34—Computer-assisted medical diagnosis or treatment, e.g. computerised prescription or delivery of medication or diets, computerised local control of medical devices, medical expert systems or telemedicine
- G06F19/3487—Medical report generation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
- G06F21/645—Protecting data integrity, e.g. using checksums, certificates or signatures using a third party
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30017—Multimedia data retrieval; Retrieval of more than one type of audiovisual media
- G06F17/30023—Querying
- G06F17/30038—Querying based on information manually generated or based on information not derived from the media content, e.g. tags, keywords, comments, usage information, user ratings
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30244—Information retrieval; Database structures therefor; File system structures therefor in image databases
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/3061—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
Similar Documents
Publication | Publication Date | Title |
---|---|---|
McKemmish | What is forensic computing? | |
Kent et al. | Guide to integrating forensic techniques into incident | |
US7962492B2 (en) | Data management apparatus, data management method, data processing method, and program | |
Sindhu et al. | Digital forensic investigation tools and procedures | |
Caloyannides | Privacy protection and computer forensics | |
US20100241977A1 (en) | Obtaining Complete Forensic Images Of Electronic Storage Media | |
Casey et al. | Introduction to windows mobile forensics | |
Kent et al. | Sp 800-86. guide to integrating forensic techniques into incident response | |
Flaglien et al. | Storage and exchange formats for digital evidence | |
Craiger et al. | Law enforcement and digital evidence | |
Kayabaş et al. | Cyber wars and cyber threats against mobile devices: Analysis of mobile devices | |
Schroader et al. | Alternate Data Storage Forensics | |
Casey et al. | Forensic analysis | |
Valli | Throwing out the Enterprise with the Hard Disk. | |
Hargreaves | Assessing the reliability of digital evidence from live investigations involving encryption | |
Montesano | The Anti-forensics Tactics, Techniques, and Procedures (TTPs) Cybercriminals Use to Hide Electronic Evidence of Crimes | |
Hosmer et al. | Advancing crime scene computer forensics techniques | |
Price et al. | Digital forensics | |
Kizza | Computer and network forensics | |
WO2007081960A2 (en) | Enterprise-wide data identification, sharing and management | |
Schwittay | Towards automating analysis in computer forensics | |
Päivinen | Digital Forensics and its Future | |
Easttom et al. | Data Hiding Techniques in Windows: Karely Rodriguez, karely. m. rodriguez. galvan@ Vanderbilt. Edu | |
Casey et al. | Intrusion investigation | |
Kizza | Computer crime investigations-computer forensics |