Digital Forensic Investigation on File System And Database Tampering

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Detecting Database File Tampering through Page Carving

Database Management Systems (DBMSes) secure data against regular users through defensive mechanisms such as access control, and against privileged users with detection mechanisms such as audit logging. Interestingly, these security mechanisms are built into the DBMS and are thus only useful for monitoring or stopping operations that are executed through the DBMS API. Any access that involves di...

متن کامل

Forensic Analysis of Digital Image Tampering

The use of digital photography has increased over the past few years, a trend which opens the door for new and creative ways to forge images. The manipulation of images through forgery influences the perception an observer has of the depicted scene, potentially resulting in ill consequences if created with malicious intentions. This poses a need to verify the authenticity of images originating ...

متن کامل

Accuracy of an Intraoral Digital System for File Length Measurement

Introdouction: Canal length measurement is essential for proper endodontic treatment. Any error or miscalculation in working length determination, particularly in curved canals, can result in complications during or after root canal therapy. Digital radiography has enabled accurate measurement of curved canal length. In this study, we evaluated the accuracy of calibration of a complementary m...

متن کامل

A Log File Digital Forensic Model

This paper describes a digital forensic model for investigating computer networks, focusing specifically on network log mining. A thorough examination of log files is needed to reveal the hidden actions of criminals in computer networks. The proposed model specifies the steps that forensic investigators can follow with regard to the extraction and examination of digital evidence from log files ...

متن کامل

Zettabyte File System Autopsy: Digital Crime Scene Investigation for Zettabyte File System

Files stored on a computer are managed by the file system of the operating system. When a computer is used to store illegal data such as child pornography, it is important that the existence of the illegal data can be proven even after the data is deleted. In this study, a new functionality is added to the Zettabyte File System (ZFS) debugger, which digs into the physical disk of the computer w...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IOSR Journal of Engineering

سال: 2012

ISSN: 2278-8719,2250-3021

DOI: 10.9790/3021-0202214221