Abstract

Today, digital signature technologies are being used in many aspects of information security, including proof of identity, authentication, authorization, integrity and non- repudiation. The combination of Kim & Spafford's early research, and the application of digital signatures and SmartCards to the preservation of computer based evidence, is the basis of this paper. We will discuss the technical and operational weaknesses of current methods employed to protect the integrity of computer evidence, and recommend solutions for simplifying and enhancing the evidence preservation and collection process.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call