English  |  正體中文  |  简体中文  |  Post-Print筆數 : 27 |  Items with full text/Total items : 110182/141115 (78%)
Visitors : 46732004      Online Users : 815
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    政大機構典藏 > 商學院 > 資訊管理學系 > 學位論文 >  Item 140.119/70978
    Please use this identifier to cite or link to this item: https://nccur.lib.nccu.edu.tw/handle/140.119/70978


    Title: 數位鑑識實驗室建構芻議及建議分析作業流程
    A Study on the Construction of Digital Forensics Laboratory and on the Suggestions about Forensic Analysis Process
    Authors: 許晉銘
    Hsu, Jimmy
    Contributors: 左瑞麟
    Tso, Ray Lin
    許晉銘
    Hsu, Jimmy
    Keywords: 數位鑑識
    Computer Forensic
    Date: 2013
    Issue Date: 2014-11-03 10:08:56 (UTC+8)
    Abstract: 隨著個人資料保護法即將正式實行,許多國內相關單位開始重視數位鑑識,以處理及因應未來與日俱增之資訊安全事件。數位鑑識實驗室的建置目前尚未有各國皆遵循的標準和流程,國內鑑識人員大多僅能按照所屬組織的規範和建議流程進行鑑識作業。本論文將藉由參考國際針對一般實驗室訂定的ISO17025及數位鑑識相關實務經驗,提出符合規範和適合實際鑑識流程的鑑識實驗室建構及處理標準之建議。
    With the Personal Information Protection Act will be formally implemented, many organization pay more attention to digital forensics to face information security events growing. But there is no standards and processes to build a digital forensics lab and investigators can only follow their teams’ specifications and process. This paper will give suggestions about the structure of digital forensics lab and standard operation process of digital forensics base on ISO17025 and practical experience.
    Reference: [1] Casey, E. (2000). Digital Evidence and Computer Crime, San Diego, California: Academic Press.
    [2] Casey, E. (2004).Digital Evidence and Computer Crime Second Edition,forensic science, computer and the internet.
    [3] 王旭正、柯宏叡、黃嘉宏、詹前隆(民96)。資訊戰攻擊與入侵證據鑑識,國家實驗研究院科技政策研究與資訊中心資通安全專論,T96010。
    [4] Warren G. Kruse, Jay G.Heiser(2002). Computer Forensics
    [5] Kuchta, K. J. (2002). Computer Forensics Today. Information Systems Security, Volume 9, No. 2, 29-33.
    [6] 林宜隆,建構數位證據鑑識標準作業程序(DEFSOP)與案例實證之研究(民101),第101期司法新聲季刊,第四篇
    [7] 王旭正、柯宏叡、楊誠育(民91)。網站入侵安全的證據存留鑑識探討,Communications of the CCISA,2002年,Vol.8 No.4
    [8] 王旭正、柯宏叡、黃嘉宏、陳世豪、張躍瀚(民95)。資安事件之電腦鑑識即時應變工具使用研究,2006電子商務與數位生活研討會。
    [9] 財團法人全國認證基金會(民100)。ISO/IEC 17025:2005 測試與校正實驗室能力一般要求。
    [10] Douglas A. Schmitknecht(2004) ,Building FBI computer forensics capacity: onelab at a time
    [11] Eoghan Casey(2002).Handbook of Computer, Crime Investigation. ACADEMIC
    PRESS
    [12] 王旭正、林祝興、ICCL資訊密碼暨建構實驗室(民98)。數位科技安全與鑑識。新北市:博碩文化出版社。
    [13] 王旭正(民100)。數位鑑識之軌跡VS 偽裝之滅跡。
    [14] 余山亮、楊中皇(民100)。數位鑑識實驗室建置之雛議。
    [15] 蔡旻峰、陳志誠(民93)。數位鑑識實驗室建構標準之芻議。2004第六屆「網際空間:資訊、法律與社會」學術研究暨實務研討會。
    [16] 廖惠雯、劉文港(民97)。電腦鑑識程序之研究。資訊科技國際研討會論文集。
    [17] 黃嘉宏、詹前隆、王旭正。電腦鑑識工具應用於犯罪偵查之研究。警察通識與專業學術研討會論文集。
    [18] Harlan Carvey (2012).Windows Forensic Analysis Toolkit 3rd Edition,Syngress
    [19] 王旭正、張躍瀚、黃嘉宏、高大宇(民95)。電腦鑑識環境建置的規劃、訓練時代需求。國家實驗研究院科技政策研究與資訊中心資通安全分析專論,T95017。
    [20] 林宜隆、張文耀、劉耿旭。建構個人資料保護之數位證據鑑識標準作業程序。第27期電腦稽核期刊,P136-P148
    Description: 碩士
    國立政治大學
    資訊管理研究所
    989710104
    102
    Source URI: http://thesis.lib.nccu.edu.tw/record/#G0098971014
    Data Type: thesis
    Appears in Collections:[資訊管理學系] 學位論文

    Files in This Item:

    File Description SizeFormat
    101401.pdf1103KbAdobe PDF2479View/Open


    All items in 政大典藏 are protected by copyright, with all rights reserved.


    社群 sharing

    著作權政策宣告 Copyright Announcement
    1.本網站之數位內容為國立政治大學所收錄之機構典藏,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。
    The digital content of this website is part of National Chengchi University Institutional Repository. It provides free access to academic research and public education for non-commercial use. Please utilize it in a proper and reasonable manner and respect the rights of copyright owners. For commercial use, please obtain authorization from the copyright owner in advance.

    2.本網站之製作,已盡力防止侵害著作權人之權益,如仍發現本網站之數位內容有侵害著作權人權益情事者,請權利人通知本網站維護人員(nccur@nccu.edu.tw),維護人員將立即採取移除該數位著作等補救措施。
    NCCU Institutional Repository is made to protect the interests of copyright owners. If you believe that any material on the website infringes copyright, please contact our staff(nccur@nccu.edu.tw). We will remove the work from the repository and investigate your claim.
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback