New Digital Forensics Investigation Procedure Model

@article{Shin2008NewDF,
  title={New Digital Forensics Investigation Procedure Model},
  author={Yong-Dal Shin},
  journal={2008 Fourth International Conference on Networked Computing and Advanced Information Management},
  year={2008},
  volume={1},
  pages={528-531}
}
In this paper, we presented a new digital forensics investigation procedure model which is as follows: investigation preparation, classifying cyber crime and deciding investigation priority, investigating damaged (victim) digital crime scene, criminal profiling consultant and analysis, tracking suspects, investigating injurer digital crime scene, summoning suspect, additional investigation, writing criminal profiling, writing report. 

From This Paper

Figures, tables, and topics from this paper.

Citations

Publications citing this paper.
Showing 1-9 of 9 extracted citations

Proactive System for Digital Forensic Investigation by Soltan

Abed Alharbi
2014
View 4 Excerpts
Highly Influenced

The Governance of Corporate Forensics Using COBIT, NIST and Increased Automated Forensic Approaches

2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Confernece on Social Computing • 2012

References

Publications referenced by this paper.
Showing 1-10 of 12 references

The Enhanced Digital Investigation Process Model

Venansius Baryamureeba, Florence Tushabe barya
2004
View 4 Excerpts
Highly Influenced

A Proposal of Digital Forensic Investigation Process Model

J. L. Shin, S. H. Lee, S. Lee
Proceedings of the Korea Institutes of Information Security and Cryptology Summer Conference, • 2006
View 5 Excerpts
Highly Influenced

A Study of Digital Investigation Modeling Method

S. H. Lee, J. L. Shin, K. S. Lim, S. J. Lee
Proceedings of the Korea Institutes of Information Security and Cryptology Summer Conference, • 2006
View 5 Excerpts
Highly Influenced

Digital evidence collection process in integrity and memory information gathering

First International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE'05) • 2005
View 4 Excerpts
Highly Influenced

Scene of the cybercrime computer forensic handbook

D. L. Shinder
Syngress Publishing, • 2004
View 4 Excerpts
Highly Influenced

A Study on the Chain of Custody for Securing the Faultlessness of Forensic Data

G. A. Lee, D. W. Park, Y. T. Shin
Journal of the Korea Society of Computer and Information, • 2006
View 1 Excerpt

A Study on Network Forensics Information in Automated Computer Emergency Response System ”

J. S. Park, U. H. Choi, J. Moon, T. Shon
Journal of the Korea Institute of Information Security and Cryptology • 2004

A Study on Network Forensics Information in Automated Computer Emergency Response System”,Journal of the Korea Institute of Information

J. S. Park, U. H. Choi, J. Moon, T. Shon
Security and Cryptology, • 2004
View 1 Excerpt

Computer forensics: System forensics tendency and technology”,Korea

H. W. Hwang, M. S. Kim, B. N. Noh, J. M. Lim
Institutes of Information Security and Cryptology Review, • 2003

Similar Papers

Loading similar papers…