Mostrar el registro sencillo del ítem
Computer technique for the suitability of digital evidence in attacking an information system: Forensic analysis for the digital custody chain
dc.contributor.author | JACOME , NAYDU J | |
dc.contributor.author | Villamizar Nuñez, C | |
dc.date.accessioned | 2021-11-04T18:45:14Z | |
dc.date.available | 2021-11-04T18:45:14Z | |
dc.date.issued | 2019-11-19 | |
dc.identifier.uri | http://repositorio.ufps.edu.co/handle/ufps/657 | |
dc.description.abstract | This article presents results of a research project that attempted to create a model of forensics in an information system; since forensic analysis allows to establish the causes of security commitment information system. The aim of the study was to determine the software tools to be used in the management of security incidents in an information system; required for the design of computer art for extracting digital evidence to anchor the chain of custody items. The research methodology was descriptive and applied document type, by analyzing the different tools technique that allows maintenance of digital evidence was designed, preserving the integrity of this as a test mechanism in a judicial process. In this way, the procedures to be performed to store information were established without being altered chain of custody solving the above questions: What is the chronological order in which the events of alteration, transmission or access occurred? What evidence have to believe you are a victim?, what are the damages incurred?, who do responsible for the incident?, what people are suspicious of the event?, who has investigated the incident and which actions has taken to preserve, identify, collect and analyze the data involved?; ensuring this way through technical steps and tools to be used for the preservation of the chain of custody, as an evidence in a court case. | eng |
dc.format.extent | 7 Páginas | spa |
dc.format.mimetype | application/pdf | spa |
dc.language.iso | eng | spa |
dc.publisher | Journal of Physics: Conference Series | spa |
dc.relation.ispartof | Journal of Physics: Conference Series ISSN: 1742-6596, 2019 vol:1388 fasc: págs: 1 - 6, DOI:10.1088/1742-6596/1388/1/012027 | |
dc.rights | Content from this work may be used under the terms of the Creative Commons Attribution 3.0 licence. | eng |
dc.rights.uri | https://creativecommons.org/licenses/by/4.0/ | spa |
dc.source | https://iopscience.iop.org/article/10.1088/1742-6596/1388/1/012027 | spa |
dc.title | Computer technique for the suitability of digital evidence in attacking an information system: Forensic analysis for the digital custody chain | eng |
dc.type | Artículo de revista | spa |
dcterms.references | Sampieri R 2014 Metodología de la investigación (México: McGraw-Hill) | spa |
dcterms.references | Arias F 2012 El Proyecto de Investigación (Caracas: Episteme) | spa |
dcterms.references | Sabino 1996 Método de investigación (Caracas: Panapo) | spa |
dcterms.references | Díaz A 2014 Apuntes de Derecho informático (Bogotá: Habeas Data Consultores) | spa |
dcterms.references | Cano J 2013 Computación forense, descubriendo los rastos informáticos (Bogotá: Alfaomega) | spa |
dcterms.references | Gómez J 2012 Hackers aprende a atacar y a defenderse (Bogotá: Alfaomega) | spa |
dcterms.references | Arnedo and García 2014 Herramientas de análisis forense y su aplicabilidad en la investigación de delitos informáticos (Colombia: Universidad Internacional de la Rioja) | spa |
dcterms.references | Paloma L 2012 Computer crimes in the cyberspace (Bogota: Juridical Editions) | spa |
dcterms.references | Corte Constitucional Republica de Colombia 2010 Sentencia C-334/1 (Colombia: Corte Constitucional República de Colombia) | spa |
dcterms.references | Senado de Colombia 2004 Ley 906 de 2004 (Secretaria del Senado de Colombia) | spa |
dcterms.references | Fiscalía General de la Nación 2004 Manual de procedimientos del sistema de cadena de custodia (Colombia: Fiscalía General de la Nación) | spa |
dcterms.references | Valdes and Tejedor 2015 Hashing. Un concepto, una realidad (Panamá: Universidad Tecnológica de Panamá) | spa |
dc.identifier.doi | https://doi.org/10.1088/1742-6596/1388/1/012027 | |
dc.relation.citationedition | Vol. 1388 No. (2019) | spa |
dc.relation.citationendpage | 6 | spa |
dc.relation.citationissue | (2019) | spa |
dc.relation.citationstartpage | 1 | spa |
dc.relation.citationvolume | 1388 | spa |
dc.relation.cites | N Jácome-Castilla and C Villamizar-Nuñez 2019 J. Phys.: Conf. Ser. 1388 012027 | |
dc.relation.ispartofjournal | Journal of Physics: Conference Series | spa |
dc.rights.accessrights | info:eu-repo/semantics/openAccess | spa |
dc.rights.creativecommons | Atribución 4.0 Internacional (CC BY 4.0) | spa |
dc.type.coar | http://purl.org/coar/resource_type/c_6501 | spa |
dc.type.content | Text | spa |
dc.type.driver | info:eu-repo/semantics/article | spa |
dc.type.redcol | http://purl.org/redcol/resource_type/ART | spa |
oaire.accessrights | http://purl.org/coar/access_right/c_abf2 | spa |
oaire.version | http://purl.org/coar/version/c_970fb48d4fbd8a85 | spa |
dc.type.version | info:eu-repo/semantics/publishedVersion | spa |