Efficient Model for Detection Data and Data Scheme Tempering With Purpose of Valid Forensic Analysis

Free registration required

Executive Summary

Accelerating development of information technologies also causes the growth of computer crime which has the main goal to profit illegally, industrial espionage, forgery and falsification of data. Therefore, a demand for data security is needed more than ever. This paper describes a model which ensures effective detection of authorized and unauthorized modification of database scheme and data itself. At the moment when data modification becomes a criminal act, this model represents a foundation for forensic analysis of collected digital evidence.

  • Format: PDF
  • Size: 693.2 KB