Review of Evidence Collection and Protection Phases in Digital Forensics Process
Review of Evidence Collection and Protection Phases in Digital Forensics Process
This study reviews crime scene investigation, collection of evidence, and protecting evidence phases of digital forensic process based on the research in the literature. Using appropriate methods for collecting and protecting electronic evidence would contribute to digital forensics and information technology law. In order to have effective evidence analysis, the first phases of the digital forensic process need to be completed through appropriate methods. In this study, the main emphasis will be on digital forensics process as well as hardware and software utilized during this procedure.
___
- [1] Ş. Sağıroğlu, M. Karaman. “Adli Bilişim”. Telepati, Vol.
203, pp. 62, August, 2012.
- [2] Y. Kim and K. J. Kim, “A Forensic Model on DeletedFile Verification for Securing Digital Evidence”. 978—1-
4244-5493-8710 IEEE, 2010.
- [3] http://www.ekizer.net. “Adli Bilişim (Computer
Forensics)”, Latest Access Time for the website is 14
October 2016.
- [4] M. Özen, G. Özocak, “Adli Bilişim, Elektronik Deliller
ve Bilgisayarlarda Arama ve El Koyma Tedbirinin
Hukuki Rejimi (CMK M. 134)”. Ankara Barosu Dergisi,
2015.
- [5] M. Z. Gündüz, Bilişim suçlarına yönelik IP tabanlı delil
tespiti- IP-based Evidence Detection, Master
Dissertation, University of Fırat 2013.
- [6] M. Orta, Bilişim Suçlarında Adli Analiz, Ph.D
Dissertation, University of Selçuk 2015.
- [7] L. Keser Berber, Adli Bilişim. Yetkin Publisher/Ankara,
2004.
- [8] http://slideplayer.biz.tr/slide/1918963. Y. Uzunay,
“Dijital Delil Araştırma Süreci”, Latest Access Time for
the website is 14 October 2016.
- [9] E. Casey, Digital Evidence and Compter Crime Scene.
ABD/AP, 2004.
- [10] T. Henkoğlu, Adli Bilişim Dijital Delillerin Elde
Edilmesi ve Analizi, Pusula Publisher/İstanbul, 2014.
- [11] Y. Başar, Siber Suç Soruşturmalarında Adli Bilişim
İncelemeleri, Master Dissertation, University of Kocatepe
2015.
- [12] R. Adams, V. Hobbs, G. Mann. “The Advanced Data
Acquisition Model (ADAM): A Process Model for
Digital Forensic Practice”. Journal of Digital Forensics,
Security and Law, JDFSL. Vol. 8, No. 4, pp. 25-48, 2013.
- [13] R. J. Vacca, Computer Forensics, Second Edition,
Charles River Media, IBSN: 1–58450–389–0, 2005.
- [14] M. Kaygısız, Kriminalistik Olay Yeri İnceleme Suç Yeri
ve Delil Güvenliği, Adalet Publisher, 2007.
- [15] http://www.chip.com.tr/forum/Bilisim-SuclarininDelillendirilmesi_t8007.html. “CHIP Online”, Latest
Access Time for the website is 6 October 2016.
- [16] H. Aydoğan, Adli Bilişim'de Yeni Elektronik Delil Elde
Etme Yöntemleri, Master Dissertation, Institute of Police
Academy Security Sciences 2009.
- [17] G. Kessler, G. Carlton. “A Study of Forensic Imaging in
the Absence of Write-Blockers”. Journal of Digital
Forensics, Security and law, JDFSL, Vol. 9, No. 3, pp.
51-58, 2014.
- [18] http://www.difose.com.tr/blog/index.php/testler/89-
solid-state-disk-adli-kopyasi. “DIFOSE Digital Forensics
Services”, Latest Access Time for the website is 6
November 2016.
- [19] A. Ekim, Bilişim Suçlarında Sayısal Delillerin
Toplanması, Muhafaza Edilmesi, İncelenmesi ve
Raporlanması, Master Dissertation, University of
Marmara 2013.
- [20] M. Ukşal, Mobil Cihazlarda Adli Bilişim, Master
Dissertation, University of İstanbul Bilgi 2015.
- [21] L. Tobin, P. Gladyshev. “Open Forensic Devices”,
Journal of Digital Forensics, Security and law, JDFSL.,
Vol 10, No. 4, pp. 97-104, 2015.
- [22] R. V. Voorst, M.-T. Kechadi, N.-A. Le-Khac. “Forensic
Acquisition of IMVU: A Case Study,” Journal of Digital
Forensics, Security and Law, JDFSL, Vol. 10, No. 4, pp.
69-78, 2015.
- [23] F. Breitinger, İ. Baggili. “File Detection on Network
Traffic Using Approximate Matching”, Journal of Digital
Forensics, Security and Law, JDFSL, Vol. 9, No. 2, pp.
23-36, 2014.
- [24] M. S. Kılıç. Elektronik Deliller ve Yapısal Özellikleri.
Edit: H. Çakır and M.S. Kılıç. Adli Bilişim ve Elektronik
Deliller, Seçkin Publisher/Ankara, 2014.
- [25] D. Chang, S. K. Sanadhya, M. Singh. “Security
Analysis of MVHASH-B Similarity Hashing”. Journal of
Digital Forensics, Security and Law, JDFSL, Vol. 11,
No. 2, pp. 21-34, 2015.
- [26] J. Eggestein, K. Knapp. “Fighting Child Pornography:
A Review of Legal and Technological Developments”.Journal of Digital Forensics, Security and Law, JDFSL,
Vol. 9, No. 4, pp. 29-48, 2014