Skip to main navigation menu Skip to main content Skip to site footer

Digital forensic evidence in computing, networking and cloud computing

Evidencia forense digital en equipos de cómputo, redes y computación en la nube




Section
Artículos

How to Cite
Triana-Fuentes, J. J., & BALLESTEROS-RICAURTE, J. A. (2016). Digital forensic evidence in computing, networking and cloud computing. Ventana Informatica, 34. https://doi.org/10.30554/ventanainform.34.1705.2016
Download Citation

Dimensions
PlumX

How to Cite

Triana-Fuentes, J. J., & BALLESTEROS-RICAURTE, J. A. (2016). Digital forensic evidence in computing, networking and cloud computing. Ventana Informatica, 34. https://doi.org/10.30554/ventanainform.34.1705.2016

Download Citation

José Javier Triana-Fuentes
Javier Antonio BALLESTEROS-RICAURTE

José Javier Triana-Fuentes,

Ingeniero de Sistemas; Esp. en Diseño y construcción de soluciones telemáticas; Magister(c) en Tecnología Informática. Técnico operativo, Secretaría de Educación de Boyacá (Tunja, Boyacá, Colombia).

Javier Antonio BALLESTEROS-RICAURTE,

Ingeniero de Sistemas; Magíster en Ciencias Computacionales. Docente asociado, Escuela de Ingeniería de Sistemas, Universidad Pedagógica y Tecnológica de Colombia (Tunja, Boyacá, Colombia).

Computer forensics is responsible for investigating records by which a crime may have made using electronic devices, in order to discover and analysis available information so it can serve as evidence in a legal matter. Today, with the ability to store and process information at local, remote and cloud level, companies need a greater security level. Through computer forensics and different techniques that have been developed, applicable by location and data management, you can get to the processes and events that led to such a situation and thus reconstruct the events that led to it. Various forensic methods include capturing digital evidence without altering the source information. Thanks to technological advances, this article aims to present and analyze how to acquire evidence and the tools used to it, in order to made an analysis later on, emphasizing the computational forensic capture in networks and cloud computing.

Article visits 1344 | PDF visits 947


Downloads

Download data is not yet available.
Sistema OJS 3.4.0.10 - Metabiblioteca |