A survey of contemporary enterprise storage technologies from a digital forensics perspective

نویسندگان

  • Gregory H. Carlton
  • Joe Matsumoto
چکیده

As the proliferation of digital computational systems continue to expand, increasingly complex technologies emerge, including those regarding large, enterprise-wide, information storage and retrieval systems. Within this study, we examine four contemporary enterprise storage technologies. Our examination of these technologies is presented with an overview of the technological features of each offering and then followed with a discussion of the impact of these technologies on digital forensics methods, particularly regarding forensic data acquisition. We offer a general opinion concerning a recommended data acquisition method when faced with the task of obtaining a forensic image of data contained within these technologies, we discuss limitations of our study, and lastly, we suggest areas in which additional research would benefit the field of digital forensics.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Legacy Forensics: An Emerging Challenge

With the passage of time and as new types of storage devices are introduced into the marketplace, contemporary devices will slowly lose their compatibility with current operating systems and PC hardware. As a result, such “legacy” devices will pose an analytical challenge to the field of digital forensics. Dated technology, while still fully functional, is becoming increasingly incompatible wit...

متن کامل

Cyber Forensics: A Military Operations Perspective

This paper discusses some of the unique military requirements and challenges in Cyber Forensics. A definition of Cyber Forensics is presented in a military context. Capabilities needed to perform cyber forensic analysis in a networked environment are discussed, along with a list of current shortcomings in providing these capabilities and a technology needs list. Finally, it is shown how these t...

متن کامل

Cooperative mode: Comparative storage metadata verification applied to the Xbox 360

This work addresses the question of determining the correctness of forensic file system analysis software. Current storage systems are built on theory that is robust but not invincible to faults, from software, hardware, or adversaries. Given a parsing of a storage system of unknown provenance, the lack of a sound and complete analytic theory means the parsing's correctness cannot be proven. Ho...

متن کامل

The drivers behind enterprise content management: a process-oriented perspective

Over the last few years, organizations have increasingly been paying attention to the concept of enterprise content management (ECM), which refers to the strategies, methods, and technologies required for capturing, storing, retrieving, delivering, and retaining all types of digital information across the organization. While the market for ECM software is rapidly growing, information systems (I...

متن کامل

Privacy Impacts of Data Encryption on the Efficiency of Digital Forensics Technology

Owing to a number of reasons, the deployment of encryption solutions are beginning to be ubiquitous at both organizational and individual levels. The most emphasized reason is the necessity to ensure confidentiality of privileged information. Unfortunately, it is also popular as cyber-criminals' escape route from the grasp of digital forensic investigations. The direct encryption of data or ind...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • JDFSL

دوره 6  شماره 

صفحات  -

تاریخ انتشار 2011