Presentation 2005-07-21
Systematizing of Information Forensics
Kouichi MUKOUYAMA, Katsuya UCHIDA,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) It can be said that the environment for which our country can easily use the computer system network by the IT advance in technology is in order. However, the case that has been rolled in the computer crime in the place where the user doesn't know comes to be seen here and there. This can be said that the user should recognize the behavior of the self, and it prove validity. Moreover, how the computer system network in the organization corporate is used should be managed and be audited duly though begins to be recognized the importance of the security audit from the viewpoint of internal management in the organization corporate. It is an activity that examines from the viewpoint as the extension of the audit of the enterprise and the organization for the trial, and systematizes the a series of action in information law department study (Information Forensics). In the main discourse, it was an Australian standard when the systematization of the information law department study was considered, and "Guidelines for the management of IT evidence"(HB171-2003) was investigated, and it was considered what to examined for the evidence collection in the future.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) Information Forensics / Computer Crime / Internal Management / Security Audit / Investigation
Paper # ISEC2005-27,SITE2005-25
Date of Issue

Conference Information
Committee SITE
Conference Date 2005/7/14(1days)
Place (in Japanese) (See Japanese page)
Place (in English)
Topics (in Japanese) (See Japanese page)
Topics (in English)
Chair
Vice Chair
Secretary
Assistant

Paper Information
Registration To Social Implications of Technology and Information Ethics (SITE)
Language JPN
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) Systematizing of Information Forensics
Sub Title (in English)
Keyword(1) Information Forensics
Keyword(2) Computer Crime
Keyword(3) Internal Management
Keyword(4) Security Audit
Keyword(5) Investigation
1st Author's Name Kouichi MUKOUYAMA
1st Author's Affiliation INSTITUTE of INFORMATION SECURITY()
2nd Author's Name Katsuya UCHIDA
2nd Author's Affiliation INSTITUTE of INFORMATION SECURITY
Date 2005-07-21
Paper # ISEC2005-27,SITE2005-25
Volume (vol) vol.105
Number (no) 192
Page pp.pp.-
#Pages 7
Date of Issue