Open Access Open Access  Restricted Access Subscription Access

Common Phases of Computer Forensics Investigation Models


Affiliations
1 College of Information Technology, Universiti Tenaga Nasional, Selangor, Malaysia
 

The increasing criminal activities using digital information as the means or targets warrant for a structured manner in dealing with them. Since 1984 when a formalized process been introduced, a great number of new and improved computer forensic investigation processes have been developed. In this paper, we reviewed a few selected investigation processes that have been produced throughout the years and then identified the commonly shared processes. Hopefully, with the identification of the commonly shard process, it would make it easier for the new users to understand the processes and also to serve as the basic underlying concept for the development of a new set of processes. Based on the commonly shared processes, we proposed a generic computer forensics investigation model, known as GCFIM.

Keywords

Computer Forensic Models, Computer Forensic Investigation.
User
Notifications
Font Size

Abstract Views: 693

PDF Views: 330




  • Common Phases of Computer Forensics Investigation Models

Abstract Views: 693  |  PDF Views: 330

Authors

Yunus Yusoff
College of Information Technology, Universiti Tenaga Nasional, Selangor, Malaysia
Roslan Ismail
College of Information Technology, Universiti Tenaga Nasional, Selangor, Malaysia
Zainuddin Hassan
College of Information Technology, Universiti Tenaga Nasional, Selangor, Malaysia

Abstract


The increasing criminal activities using digital information as the means or targets warrant for a structured manner in dealing with them. Since 1984 when a formalized process been introduced, a great number of new and improved computer forensic investigation processes have been developed. In this paper, we reviewed a few selected investigation processes that have been produced throughout the years and then identified the commonly shared processes. Hopefully, with the identification of the commonly shard process, it would make it easier for the new users to understand the processes and also to serve as the basic underlying concept for the development of a new set of processes. Based on the commonly shared processes, we proposed a generic computer forensics investigation model, known as GCFIM.

Keywords


Computer Forensic Models, Computer Forensic Investigation.