30 lines
2.2 KiB
TeX
30 lines
2.2 KiB
TeX
\newcommand{\introauthor}{Miha Frangež}
|
|
%
|
|
% The first few paragraphs don't really change between years
|
|
%
|
|
Digital forensics is a pivotal branch of forensic science dedicated to the recovery and investigation of materials found in
|
|
digital devices. Originally synonymous with computer forensics, the field of digital forensics has expanded significantly
|
|
to encompass the examination of all digital data storage devices. Its roots can be traced back to the personal computer
|
|
revolution of the late 1970s and early 1980s, evolving through the 1990s without formal organization until the emergence
|
|
of national guidelines in the 21st century.
|
|
\par
|
|
Digital forensic investigations serve diverse purposes, primarily to substantiate or challenge hypotheses in both criminal
|
|
and civil court proceedings. In criminal cases, these investigations support allegations of offenses such as murder, theft,
|
|
and personal assault. In civil cases, they safeguard individuals’ rights and property, often addressing disputes ranging
|
|
from family matters to contractual conflicts among economic entities. The field also extends into electronic discovery,
|
|
crucial in modern litigation.
|
|
\par
|
|
This conference gathers the seminar papers of master’s students at the Faculty of Computer Science and Information,
|
|
University of Ljubljana \currentyear/\nextyear. It explores a variety of topics including mobile forensics, logs, password forensics
|
|
and cyphering, browser forensics and forensic investigation. Each paper contributes to the ongoing development and
|
|
application of digital forensic techniques, enhancing our ability to navigate the complexities of today’s digital landscape.
|
|
In mobile forensics, three seminar papers provide valuable insights. The first paper addresses data recovery from
|
|
damaged devices, highlighting challenges in accessing data without owner-provided access. The second paper evaluates
|
|
smartphone backup integrity, focusing on iPhone and Android systems. The third paper examines MOBILedit Forensic
|
|
Express for retrieving digital evidence, emphasizing complexities in accessing messaging app data amid evolving security
|
|
measures.
|
|
%
|
|
% Here, add a one-paragraph summary for each of the categories/topics
|
|
%
|
|
|
|
% TODO: do this
|