Template 2: electric boogaloo
This commit is contained in:
parent
85d1332d58
commit
c033998e95
9 changed files with 336 additions and 34 deletions
30
edit_this/30-introduction.tex
Normal file
30
edit_this/30-introduction.tex
Normal file
|
@ -0,0 +1,30 @@
|
|||
\newcommand{\introauthor}{Miha Frangež}
|
||||
%
|
||||
% The first few paragraphs don't really change between years
|
||||
%
|
||||
Digital forensics is a pivotal branch of forensic science dedicated to the recovery and investigation of materials found in
|
||||
digital devices. Originally synonymous with computer forensics, the field of digital forensics has expanded significantly
|
||||
to encompass the examination of all digital data storage devices. Its roots can be traced back to the personal computer
|
||||
revolution of the late 1970s and early 1980s, evolving through the 1990s without formal organization until the emergence
|
||||
of national guidelines in the 21st century.
|
||||
\par
|
||||
Digital forensic investigations serve diverse purposes, primarily to substantiate or challenge hypotheses in both criminal
|
||||
and civil court proceedings. In criminal cases, these investigations support allegations of offenses such as murder, theft,
|
||||
and personal assault. In civil cases, they safeguard individuals’ rights and property, often addressing disputes ranging
|
||||
from family matters to contractual conflicts among economic entities. The field also extends into electronic discovery,
|
||||
crucial in modern litigation.
|
||||
\par
|
||||
This conference gathers the seminar papers of master’s students at the Faculty of Computer Science and Information,
|
||||
University of Ljubljana \currentyear/\nextyear. It explores a variety of topics including mobile forensics, logs, password forensics
|
||||
and cyphering, browser forensics and forensic investigation. Each paper contributes to the ongoing development and
|
||||
application of digital forensic techniques, enhancing our ability to navigate the complexities of today’s digital landscape.
|
||||
In mobile forensics, three seminar papers provide valuable insights. The first paper addresses data recovery from
|
||||
damaged devices, highlighting challenges in accessing data without owner-provided access. The second paper evaluates
|
||||
smartphone backup integrity, focusing on iPhone and Android systems. The third paper examines MOBILedit Forensic
|
||||
Express for retrieving digital evidence, emphasizing complexities in accessing messaging app data amid evolving security
|
||||
measures.
|
||||
%
|
||||
% Here, add a one-paragraph summary for each of the categories/topics
|
||||
%
|
||||
|
||||
% TODO: do this
|
Loading…
Add table
Add a link
Reference in a new issue