Науковий вісник Національної академії внутрішніх справ (Sep 2021)

Current Issues an Examination Computer Hardware and Software Products during the Investigation of Crimes in the Use of Computers (Computer) Systems, Computer Networks and Telecommunication Networks

  • Bronislav Teplytskyi

DOI
https://doi.org/10.33270/01211203.28
Journal volume & issue
Vol. 26, no. 3
pp. 28 – 34

Abstract

Read online

The purpose of the article is to try to investigate the topical issues of examination of computer equipment and software products in the investigation of crimes in the use of computers, systems and computer networks and telecommunications networks. Methodology. To achieve this goal, general scientific and special methods are used, which are the means of scientific research. In particular, the method of analysis, system-structural and statistical methods provided an opportunity to explore the place of examination of computer equipment and software products in the system of forensic examinations, to identify tasks and suggest its varieties. Scientific novelty. The main subtypes of forensic examination of computer equipment and software products are singled out: research of computer equipment, research of software products, information-computer research. The basic rules and requirements for the formation of questions to the forensic expert, as well as an indicative list of issues that can be addressed during the study and the typical mistakes made by the initiators of examinations of computer equipment and software products are singled out. Conclusions. It is determined that forensic examination of computer equipment and software products is a type of computer-technical forensic examination, which belongs to the class of engineering-technical forensic examination and is internally divided into three subtypes. The basic requirements and rules of formulation of questions for the decision within the limits of examination of computer equipment and software products are developed. Typical errors during the appointment of forensic examinations of computer hardware and software products have been identified

Keywords