National Conference on Recent Trends in Computer Science and Engineering |
Foundation of Computer Science USA |
MEDHA2015 - Number 3 |
June 2015 |
Authors: P.d. Bodakhe |
9065fdcf-4715-462e-bcd6-dd9418891054 |
P.d. Bodakhe . Evidences Collection Methodologies for Forensic Investigation of Databases. National Conference on Recent Trends in Computer Science and Engineering. MEDHA2015, 3 (June 2015), 15-17.
In today's era of computing, data is a crucial entity. To store this important data and information most company and organizations uses database, i. e. they manage personnel, account, logistics etc. through the database system. Exponential usage of modern information technologies also causes the growth of computer crime which has the main goal to profit illegally, industrial espionage, forgery, falsification of data and any other illegal activity. These manipulations can be made by authorized or unauthorized users. As the business data stored in these database is very important, to investigate company dishonest act is necessary, for that purpose fruitful database forensic technique should be used. The fact that classical methods of collecting digital evidence are not appropriate and efficient and some good evidence collection methodologies are mentioned here which are useful for forensic investigation of database.