Title :
Security and Privacy in the Computer Forensics Context
Author_Institution :
Comput. Inf. Syst., Louisville Univ., Louisville, KY
Abstract :
Today computers are used in numerous day- to-day activities as a communications tool. In this regard several different applications are used to generate and store important documents. These documents contain vital data to the user and at times to an investigator in the event a crime is committed using that computer. The user would expect reasonable security precautions to be in place to protect the data on the computer, especially when the computer is connected to the Internet. The user with deceptive goals in mind would want to hide information where as a Computer Forensics investigator would want to find out the hidden information for evidence. In this paper we examine several security features that are commonly used and how such precautions are thwarted by Computer Forensics tools and their impact on privacy.
Keywords :
Internet; computer crime; data privacy; Internet; computer forensics context; deceptive goals; hidden information; security precautions; Application software; Computer crime; Computer security; Context; Data security; Forensics; Information security; Internet; Privacy; Protection;
Conference_Titel :
Communication Technology, 2006. ICCT '06. International Conference on
Conference_Location :
Guilin
Print_ISBN :
1-4244-0800-8
Electronic_ISBN :
1-4244-0801-6
DOI :
10.1109/ICCT.2006.341936