Paper
7 August 2024 Exploring digital forensics and security through authenticity verification for DingTalk-based communications
Zhijun Li, Ye Tian, Yan Li, Hong Guo
Author Affiliations +
Proceedings Volume 13229, Seventh International Conference on Advanced Electronic Materials, Computers, and Software Engineering (AEMCSE 2024); 132291C (2024) https://doi.org/10.1117/12.3038444
Event: Seventh International Conference on Advanced Electronic Materials, Computers, and Software Engineering (AEMCSE 2024), 2024, Nanchang, China
Abstract
With the rapid development of information technology, digitalization has gradually integrated into the daily lives of modern people, becoming an indispensable and important component. Especially, DingTalk software, as an office application that integrates communication and collaboration, has been widely used in daily office work. This paper studies the authenticity of electronic data produced by DingTalk software and its evidence collection methods. By analyzing the data storage mechanism of DingTalk, it identifies the challenges faced by electronic data evidence collection and proposes a method to ensure the authenticity of data. Meanwhile, it discusses strategies to counter data tampering techniques. The paper ultimately offers suggestions to improve the accuracy of evidence collection, aimed at ensuring the legal effectiveness of electronic evidence to meet security challenges and evidence collection needs.
(2024) Published by SPIE. Downloading of the abstract is permitted for personal use only.
Zhijun Li, Ye Tian, Yan Li, and Hong Guo "Exploring digital forensics and security through authenticity verification for DingTalk-based communications", Proc. SPIE 13229, Seventh International Conference on Advanced Electronic Materials, Computers, and Software Engineering (AEMCSE 2024), 132291C (7 August 2024); https://doi.org/10.1117/12.3038444
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Databases

Forensic science

Data storage

Digital forensics

Computer security

Data modeling

Analytical research

Back to Top