Mostrar el registro sencillo del ítem

dc.contributor.authorJACOME , NAYDU J
dc.contributor.authorVillamizar Nuñez, C
dc.date.accessioned2021-11-04T18:45:14Z
dc.date.available2021-11-04T18:45:14Z
dc.date.issued2019-11-19
dc.identifier.urihttp://repositorio.ufps.edu.co/handle/ufps/657
dc.description.abstractThis article presents results of a research project that attempted to create a model of forensics in an information system; since forensic analysis allows to establish the causes of security commitment information system. The aim of the study was to determine the software tools to be used in the management of security incidents in an information system; required for the design of computer art for extracting digital evidence to anchor the chain of custody items. The research methodology was descriptive and applied document type, by analyzing the different tools technique that allows maintenance of digital evidence was designed, preserving the integrity of this as a test mechanism in a judicial process. In this way, the procedures to be performed to store information were established without being altered chain of custody solving the above questions: What is the chronological order in which the events of alteration, transmission or access occurred? What evidence have to believe you are a victim?, what are the damages incurred?, who do responsible for the incident?, what people are suspicious of the event?, who has investigated the incident and which actions has taken to preserve, identify, collect and analyze the data involved?; ensuring this way through technical steps and tools to be used for the preservation of the chain of custody, as an evidence in a court case.eng
dc.format.extent7 Páginasspa
dc.format.mimetypeapplication/pdfspa
dc.language.isoengspa
dc.publisherJournal of Physics: Conference Seriesspa
dc.relation.ispartofJournal of Physics: Conference Series ISSN: 1742-6596, 2019 vol:1388 fasc: págs: 1 - 6, DOI:10.1088/1742-6596/1388/1/012027
dc.rightsContent from this work may be used under the terms of the Creative Commons Attribution 3.0 licence.eng
dc.rights.urihttps://creativecommons.org/licenses/by/4.0/spa
dc.sourcehttps://iopscience.iop.org/article/10.1088/1742-6596/1388/1/012027spa
dc.titleComputer technique for the suitability of digital evidence in attacking an information system: Forensic analysis for the digital custody chaineng
dc.typeArtículo de revistaspa
dcterms.referencesSampieri R 2014 Metodología de la investigación (México: McGraw-Hill)spa
dcterms.referencesArias F 2012 El Proyecto de Investigación (Caracas: Episteme)spa
dcterms.referencesSabino 1996 Método de investigación (Caracas: Panapo)spa
dcterms.referencesDíaz A 2014 Apuntes de Derecho informático (Bogotá: Habeas Data Consultores)spa
dcterms.referencesCano J 2013 Computación forense, descubriendo los rastos informáticos (Bogotá: Alfaomega)spa
dcterms.referencesGómez J 2012 Hackers aprende a atacar y a defenderse (Bogotá: Alfaomega)spa
dcterms.referencesArnedo and García 2014 Herramientas de análisis forense y su aplicabilidad en la investigación de delitos informáticos (Colombia: Universidad Internacional de la Rioja)spa
dcterms.referencesPaloma L 2012 Computer crimes in the cyberspace (Bogota: Juridical Editions)spa
dcterms.referencesCorte Constitucional Republica de Colombia 2010 Sentencia C-334/1 (Colombia: Corte Constitucional República de Colombia)spa
dcterms.referencesSenado de Colombia 2004 Ley 906 de 2004 (Secretaria del Senado de Colombia)spa
dcterms.referencesFiscalía General de la Nación 2004 Manual de procedimientos del sistema de cadena de custodia (Colombia: Fiscalía General de la Nación)spa
dcterms.referencesValdes and Tejedor 2015 Hashing. Un concepto, una realidad (Panamá: Universidad Tecnológica de Panamá)spa
dc.identifier.doihttps://doi.org/10.1088/1742-6596/1388/1/012027
dc.relation.citationeditionVol. 1388 No. (2019)spa
dc.relation.citationendpage6spa
dc.relation.citationissue(2019)spa
dc.relation.citationstartpage1spa
dc.relation.citationvolume1388spa
dc.relation.citesN Jácome-Castilla and C Villamizar-Nuñez 2019 J. Phys.: Conf. Ser. 1388 012027
dc.relation.ispartofjournalJournal of Physics: Conference Seriesspa
dc.rights.accessrightsinfo:eu-repo/semantics/openAccessspa
dc.rights.creativecommonsAtribución 4.0 Internacional (CC BY 4.0)spa
dc.type.coarhttp://purl.org/coar/resource_type/c_6501spa
dc.type.contentTextspa
dc.type.driverinfo:eu-repo/semantics/articlespa
dc.type.redcolhttp://purl.org/redcol/resource_type/ARTspa
oaire.accessrightshttp://purl.org/coar/access_right/c_abf2spa
oaire.versionhttp://purl.org/coar/version/c_970fb48d4fbd8a85spa
dc.type.versioninfo:eu-repo/semantics/publishedVersionspa


Ficheros en el ítem

Thumbnail

Este ítem aparece en la(s) siguiente(s) colección(ones)

Mostrar el registro sencillo del ítem

Content from this work may be used under the terms of the Creative Commons Attribution 3.0 licence.
Excepto si se señala otra cosa, la licencia del ítem se describe como Content from this work may be used under the terms of the Creative Commons Attribution 3.0 licence.