透過您的圖書館登入
IP:18.218.169.50
  • 期刊

政府機關電子檔案管理與電腦鑑識

Electronic Records Management and Computer Forensics in Government Agencies

摘要


資訊時代中,社會各角落已逐漸擁有大量以數位型式存在的資料。這些資料記載著各式活動的紀錄,普遍儲存於政府機關與人民生活中。鑑於數位證據的脆弱,檔案管理局已大力推動各式電子檔案的保存規範。然而在法庭的證據力要求下,當電子檔案被破壞或發生資訊安全事件時,如何重建數位證據以恢復原始的活動事實,就成為很重要的課題。電腦鑑識的興起,正是要彌補這部分的管理需求。本文探討電子檔案管理與電腦鑑識兩者之間的雷同之處,並說明電腦鑑識之內容,以供我國政府機關檔案管理人員在推動電子檔案管理相關業務時之參考。

並列摘要


There is huge amount of digital data with various formats in the information era. The data recording various activities is stored in the public and government agencies. Owing to the fragility of digital evidence, National Archives Administration has promulgated a number of regulations related to electronic records management for better preservation. However, for satisfying the requirement of judicial evidence to courts, how to restore destroyed data becomes a big issue for information security. Computer forensics can amend the gap of management between the two perspectives. Thus, this study discusses the similarity between electronic records management and computer forensics. Meanwhile, the content of computer forensics is introduced to government records mangers and archivists for promoting electronic records management.

參考文獻


"Electronic Crime Scene Investigation: A Guide for First Responders, Second Edition, Office of Justice Programs, U.S. Department of Justice (2008)," National Institute of Justice Website, 〈https://www.ncjrs.gov/pdffiles1/nij/219941.pdf〉( Aug. 2012).
Pollitt, Mark M.(1995).Principles, Practices, and Procedures: An Approach to Standards in Computer Forensics.The Second International Conference on Computer Evidence.(The Second International Conference on Computer Evidence).:
Marcella, A., Jr.,Greenfield, R. S.(2002).Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes.Auerbach Publications.
Rude, Thomas. "Evidence Seizure Methodology for Computer Forensics" ,(2000), 〈http://www.crazytrain.com/seizure.html〉(1 Aug. 2012).
Kuchta, Kelly J.(2002).Forensic Fieldwork: Experience Is the Best Teacher.Information Systems Security.11(1),36-43.

延伸閱讀