IJSTR

International Journal of Scientific & Technology Research

IJSTR@Facebook IJSTR@Twitter IJSTR@Linkedin
Home About Us Scope Editorial Board Blog/Latest News Contact Us
CALL FOR PAPERS
AUTHORS
DOWNLOADS
CONTACT
QR CODE
IJSTR-QR Code

IJSTR >> Volume 2- Issue 11, November 2013 Edition



International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616



A Survey On Various Methods To Detect Forgery And Computer Crime In Transaction Database

[Full Text]

 

AUTHOR(S)

Pratik Patel, Shailendra Mishra

 

KEYWORDS

Index Terms: Computer forensics, Digital forensics, Evidence, FAT file system, Forensic tools, NTFS file system, $Log file.

 

ABSTRACT

Abstract: A computer forensic method can be used for detecting the different types of forgeries and computer crime. Forgeries and computer crime are the most major concern of the digital world. Lots of techniques and methods have been used to find a proper solution to these problems. Nowadays, digital forensics are an important topic for research articles. In this paper a general survey has been carried out for different methods used in computer forensics to track the evidences which can be useful for detecting the computer crime and forgery. Forensic tools can be used for making any changes to data or tampering of data. Different rules sets or methods are defined to detect the various errors regarding the changes and the tampering of the data in different windows file system. Digital evidence can also be used to detect forgery or computer crime.

 

REFERENCES

[1] http://en.wikipedia.org/wiki/Digital_forensics

[2] http://en.wikipedia.org/wiki/Digital_evidence

[3] Brian Carrier, “Defining Digital Forensic Examination and Analysis Tools Using Abstraction Layers” International Journal of Digital Evidence (2003) pp.1-12.

[4] Simson L. Garfinkel, “Digital forensics research: The next 10 years”, Digital Investigation 7(2010) S64-s73.