Efficient Model for Detection Data and Data Scheme Tempering With Purpose of Valid Forensic Analysis

Accelerating development of information technologies also causes the growth of computer crime which has the main goal to profit illegally, industrial espionage, forgery and falsification of data. Therefore, a demand for data security is needed more than ever. This paper describes a model which ensures effective detection of authorized and unauthorized modification of database scheme and data itself. At the moment when data modification becomes a criminal act, this model represents a foundation for forensic analysis of collected digital evidence.

Provided by: International Association of Computer Science & Information Technology (IACSIT) Topic: Security Date Added: Jan 2012 Format: PDF

Find By Topic