Digital Crime Investigation and Forensics

Digital Crime Investigation and Forensics

Joseph Kizza, Florence Migga Kizza
Copyright: © 2008 |Pages: 17
ISBN13: 9781599043791|ISBN10: 1599043793|ISBN13 Softcover: 9781616927264|EISBN13: 9781599043814
DOI: 10.4018/978-1-59904-379-1.ch016
Cite Chapter Cite Chapter

MLA

Joseph Kizza and Florence Migga Kizza. "Digital Crime Investigation and Forensics." Securing the Information Infrastructure, IGI Global, 2008, pp.318-334. https://doi.org/10.4018/978-1-59904-379-1.ch016

APA

J. Kizza & F. Migga Kizza (2008). Digital Crime Investigation and Forensics. IGI Global. https://doi.org/10.4018/978-1-59904-379-1.ch016

Chicago

Joseph Kizza and Florence Migga Kizza. "Digital Crime Investigation and Forensics." In Securing the Information Infrastructure. Hershey, PA: IGI Global, 2008. https://doi.org/10.4018/978-1-59904-379-1.ch016

Export Reference

Mendeley
Favorite

Abstract

In Chapter XIV we discussed digital evidence and the process of collecting this evidence. In this chapter, we are going to focus on the investigative process. In fact, we are going to divide this process into two processes that are both related. The first process is known as computer forensics in which we investigate crime scenes that involve data on computers. We will look at the different parts of the computer and how digital evidence can be either hidden or extracted from the computer. In the second process, we consider the crime scene as not one computer but a network of computers. Our investigation then goes beyond one computer to include the infrastructure of the network and all points in the network where evidence can be either hidden or extracted. This second process we will refer to as network forensics.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.