Advancing the Science of Digital Forensics
نویسنده
چکیده
0018-9162/12/$31.00 © 2012 IEEE Published by the IEEE Computer Society DECEMBER 2012 25 rough equivalent of today’s file allocation table (FAT) or $Bitmap. A consultant systems programmer came in to show us how to recover the files by reconstructing the VTOC based upon the prior morning’s routine printout of the hard drive contents (yes, we made such a printout every day or two). Since we couldn’t use the computer without overwriting the files in what was now, essentially, unallocated space and had no PC-class systems at the time, we did the hex conversions by hand—on paper. It took us three days to reconstruct the VTOC and get back online. That was the beginning of the computer forensics process and that was our environment: using a hex editor to get down to the bare metal of the hard drive and file system. And that’s how it was for most of the next 15 years—hackers (when the term was implicitly White Hat and, indeed, noble, before Black Hat hackers hijacked the term) with an interest in investigations, most often in the law enforcement community, building rudimentary tools for use in looking deep into the computer and its file system. By the late 1990s, computer science departments began taking serious notice of computer forensics, and academic programs in digital forensics were introduced in the early 2000s. And yet, it was not until 2009 that the American Academy of Forensic Sciences adopted digital forensics as a science. Forensic sciences are largely based on Locard’s exchange principle: every contact leaves a trace—if one D igital forensics combines methods from science, technology, and engineering to acquire and interpret information stored on digital devices for use in answering questions in court. Of course, these same methods allow for the acquisition of data for use in many contexts outside the courtroom, such as pure and applied research, policy enforcement, information security incident response, and intelligence gathering.
منابع مشابه
Analyzing registry, log files, and prefetch files in finding digital evidence in graphic design applications
The products of graphic design applications leave behind traces of digital information which can be used during a digital forensic investigation in cases where counterfeit documents have been created. This paper analyzes the digital forensics involved in the creation of counterfeit documents. This is achieved by first recognizing the digital forensic artifacts left behind from the use of graphi...
متن کاملFramework for Next Generation Digital Forensics Models
Digital Forensics is a fairly new discipline, which due to the heavy overlap with the computer science and information technology is now categorized within the computer science field. On the other hand, the legal side of digital forensics is mainly coming from the traditional forensics procedures and the law. Therefore, the current models are modeling the process of digital investigation to be ...
متن کاملDigital Forensics: Emerging Trends and Analysis of Counter-Security Environment
Corporates and organizations across the globe are spending huge sums on information security as they are reporting an increase in security related incidents. The proliferation of cloud, social network and multiple mobile device usage is on one side represent an opportunity and benefits to the organisation and on other side have posed new challenges for those policing cybercrimes. Cybercriminals...
متن کاملPeer Instruction for Digital Forensics
Digital forensics can be a difficult discipline to teach effectively because of its interdisciplinary nature, closely integrating law and computer science. Prior research in Physics and Computer Science has shown that the traditional lecture approach is inadequate for the task of provoking students’ thought-processes and systematically engaging them in problem-solving during class. Peer instruc...
متن کاملScience Column: Reconstruction: The Experimental Side of Digital Forensics
Many in digital forensics seem to forget that the science part of digital forensics means experimentation and that implies a whole lot of things that most practitioners never learned.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- IEEE Computer
دوره 45 شماره
صفحات -
تاریخ انتشار 2012