Digital Forensic Investigation on File System And Database Tampering
نویسندگان
چکیده
منابع مشابه
Detecting Database File Tampering through Page Carving
Database Management Systems (DBMSes) secure data against regular users through defensive mechanisms such as access control, and against privileged users with detection mechanisms such as audit logging. Interestingly, these security mechanisms are built into the DBMS and are thus only useful for monitoring or stopping operations that are executed through the DBMS API. Any access that involves di...
متن کاملForensic Analysis of Digital Image Tampering
The use of digital photography has increased over the past few years, a trend which opens the door for new and creative ways to forge images. The manipulation of images through forgery influences the perception an observer has of the depicted scene, potentially resulting in ill consequences if created with malicious intentions. This poses a need to verify the authenticity of images originating ...
متن کاملAccuracy of an Intraoral Digital System for File Length Measurement
Introdouction: Canal length measurement is essential for proper endodontic treatment. Any error or miscalculation in working length determination, particularly in curved canals, can result in complications during or after root canal therapy. Digital radiography has enabled accurate measurement of curved canal length. In this study, we evaluated the accuracy of calibration of a complementary m...
متن کاملA Log File Digital Forensic Model
This paper describes a digital forensic model for investigating computer networks, focusing specifically on network log mining. A thorough examination of log files is needed to reveal the hidden actions of criminals in computer networks. The proposed model specifies the steps that forensic investigators can follow with regard to the extraction and examination of digital evidence from log files ...
متن کاملZettabyte File System Autopsy: Digital Crime Scene Investigation for Zettabyte File System
Files stored on a computer are managed by the file system of the operating system. When a computer is used to store illegal data such as child pornography, it is important that the existence of the illegal data can be proven even after the data is deleted. In this study, a new functionality is added to the Zettabyte File System (ZFS) debugger, which digs into the physical disk of the computer w...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IOSR Journal of Engineering
سال: 2012
ISSN: 2278-8719,2250-3021
DOI: 10.9790/3021-0202214221