Services on Demand
Article
Indicators
Related links
- Cited by SciELO
- Similars in SciELO
Bookmark
Revista Investigación y Tecnología
Print version ISSN 2306-0522
Abstract
FLORES FLORES, Iver and VARGAS PENA, Leonardo. Computer Forensics. Rev Inv Tec [online]. 2016, vol.4, n.1, pp. 105-110. ISSN 2306-0522.
Abstract Technological and commercial progress over recent years has been increasing exponentially, which has revolutionized the world so that almost everything that is done on a daily basis is done almost automatically thanks to new information technologies , allowing both large and small businesses andtheir customers and / or users to communicate, transact, paperwork, etc. Almost instantly. This technological evolution has also been used by unscrupulous people who use a range of technological tools for improper purposes, as it is the realization of a crime of computer nature, using often that information is stored in digital form can subtract it and manipulate it incorrectly. When you pass a situation like this presents a problem because computers store information that can serve as evidence in a way that can not be collected by ordinary means, ifnot the use of different tools and mechanisms required to traditional. It is here that computer forensics emerges as a relatively new science, which allows the investigation ofsuch crimes through its application. Currently Bolivia may not experience a wide variety of computer crimes, yet this would be one of the problems that eventually could affect citizens and companies whether domestic or foreign in our country. This type of crime do not exclude anyone, affects all sectors that make up our country for entrepreneurs to citizens, as all kinds ofviolence affects the possibilities of development. Computer forensics involves the participation of professionals in the information technology and legal professionals because the results obtained through the application of computer forensics are subject to judicial review. Study and Analysis on computer forensics in Bolivia allows to present what the current situation ofthis specialization in our country, for this information was necessary first point to make a preliminary investigation into computer forensics and all the elements that are involved in its implementation process. The following shows in detail the parts for which this research ranges from the theoretical stage to the practical phase of computer forensics.
Keywords : IT asset; forensic analysis; office applications; cyberbullying; Forensic Science.