Repository logo
  • English
  • Català
  • Čeština
  • Deutsch
  • Español
  • Français
  • Gàidhlig
  • Latviešu
  • Magyar
  • Nederlands
  • Polski
  • Português
  • Português do Brasil
  • Suomi
  • Svenska
  • Türkçe
  • Қазақ
  • বাংলা
  • हिंदी
  • Ελληνικά
  • Yкраї́нська
  • Log In
    New user? Click here to register.Have you forgotten your password?
Repository logo
  • Communities & Collections
  • All of DSpace
  • English
  • Català
  • Čeština
  • Deutsch
  • Español
  • Français
  • Gàidhlig
  • Latviešu
  • Magyar
  • Nederlands
  • Polski
  • Português
  • Português do Brasil
  • Suomi
  • Svenska
  • Türkçe
  • Қазақ
  • বাংলা
  • हिंदी
  • Ελληνικά
  • Yкраї́нська
  • Log In
    New user? Click here to register.Have you forgotten your password?
  1. Home
  2. Browse by Author

Browsing by Author "Daniel Fernando Segarra Fajardo"

Now showing 1 - 1 of 1
Results Per Page
Sort Options
  • No Thumbnail Available
    Item
    Análisis de recuperación de información usando la metodología “SANS” para dispositivos de almacenamiento
    (Instituto Tecnológico Superior Sudamericano, 2020) Henry Wilfrido Morocho Morocho; Daniel Fernando Segarra Fajardo
    As time passes, the storage devices are evolving together that the technology, and as a consequence of this, attacks on said devices arise, being recognized as a real threat, which violate the security and availability of the information contained in the equipment of guard; where personal data are stored as important corporate that are of absolute confidentiality but as a result can be manipulated, cloned and diverted by people who are outside the sensitive information you have, causing misuse and damaging in an important point to the image. The attacks and strategies that are generated to obtain this sensitive information are evolving day after day, which has generated that people focus on the development of methodologies, as an efficient response to incidents regarding the loss of information from devices of storage, all this is part of the forensic computer science which integrates methodologies and procedures that are indispensable in the processing of evidence through the correct use of the chain of custody, allowing the computer experts to collect clues and protect them, because they can arrive be sustainable or probative results to resolve any conflict in the east involved storage devices.

DSpace software copyright © 2002-2025 LYRASIS

  • Cookie settings
  • Privacy policy
  • End User Agreement
  • Send Feedback