计算机取证技术分为静态取证和动态取证两种。
The computer forensic mainly consists of two techniques: the static forensic and dynamic forensic.
摘要:计算机取证技术分为静态取证和动态取证两种。
Absrtact: the computer forensic mainly consists of two techniques: the static forensic and dynamic forensic.
电子证据的获取是计算机取证技术中的核心内容,是计算机取证研究的的热点。
Collecting and securing evidence is the core content of the computer forensics technology, and it is the research hot spot currently.
文中提出了一种入侵检测取证系统模型,它考虑把入侵检测和计算机取证技术结合在一起。
The paper proposes the model of IDS and computer forensic system. It connects intrusion detection and computer forensic.
在此基础上,详细分析了计算机取证技术的搜索时间成本问题,并提出了一种降低时间成本的解决方案。
Based on this knowledge, the search time cost problem of computer forensics is discussed, and a solution to reduce time cost is offered.
计算机取证技术的局限性主要包括计算机证据的局限性、取证实施过程的局限性以及取证软件的局限性。
The limitation of using the computer technology to collect evidence mainly include: the limitation of the computer evidence, the course of collecting evidence and collecting evidence software.
认真学习计算机取证技术,包括计算机取证的定义、计算机取证的原则、计算机取证的流程及计算机取证常用的工具。
The author studied knowledge about computer forensics seriously, including the definition of computer forensics, the principle of computer forensics and the process of computer forensics and so on.
计算机取证技术是当今一种热门的动态安全技术,它采用主动出击的方法,搜集入侵证据,查出黑客的来源,有效地防范黑客入侵。
Computer forensic is a dynamic security technology. It collects the proofs of intrusion and finds the source of hacker with the active methods, so it can prevent hacker intrusion effectively.
对计算机取证技术进行了研究,并与黑客防范体系结合,使黑客防范体系从技术上辅助法律在实际中担当起打击黑客行为的重要责任。
Combining the computer forensics to the intrusion defense system, this system is not only a technology, it can do a lot for the law to strike to the hackers.
该模型将入侵检测系统与司法分析技术有机结合,它的提出对计算机犯罪的动态取证有一定指导意义。
Since it is the combo of IDS and justice parsing technique, it will be instructive for the dynamic forensics of computer crime.
计算机取证是一种如何为调查计算机犯罪提供彻底有效、安全的证据的技术。
Computer Forensics is a technology to provide thorough effective and safety evidence about how to investigate computer-related crime.
从取证与反取证两方面分析计算机犯罪的特征,研究反取证技术的根源,可有效地保护国家信息网络安全,打击犯罪。
Analyzing computer crime through forensics and anti-forensics, we should find out the origin of anti-forensics to protect national information network security and beat crime.
本文开篇对计算机取证、移动存储技术的研究现状进行介绍,给出本课题的研究目的和意义。
First, the paper introduced the research statuses of computer forensics and movable devices, and then gave the purpose and significance of the subject.
鉴于计算机取证涉及计算机科学、法学、刑事侦查学等学科知识,笔者在撰写本文时从技术、程序和法律角度出发。
In view of computer Forensics involved in the knowledge of computer science, law and criminal investigation, the author started this article from technical, procedural and legal point.
美国等西方发达国家于上世纪80年代就已着手开始研究计算机取证,在取证思想、理论、技术、方法等方面现已取得不少成果。
The United States and other developed Western countries began to study Computer Forensics in the 1980s and achieved many results in evidence-collecting ideology, theory, technique and method.
美国等西方发达国家于上世纪80年代就已着手开始研究计算机取证,在取证思想、理论、技术、方法等方面现已取得不少成果。
The United States and other developed Western countries began to study Computer Forensics in the 1980s and achieved many results in evidence-collecting ideology, theory, technique and method.
应用推荐