Forensic acquiring and analysis
ثبت نشده
چکیده
In this paper I will discuss computer evidence. The law enforcement agencies are at the cross road of the new technology. These days, some crimes are committed by using computer and often the offender is located miles away from the victim. That kind of crime (fraud, threat, DoS and other) is very hard to resolve. Investigators have to perform searches on computer. To make sure that the searches are the perfect copy of the seize computer, they have to create forensic computer evidence. Computer evidence is relied upon more and more in criminal and civil litigation actions. It was computer evidence that helped identify the now infamous 'Blue Dress' in the Clinton impeachment hearings [1]. In this paper I shall give a brief explanation of the forensic acquiring and analyzing in general to provide a good over view of the responsibility of the peace officer to bring digital evidence to be acceptable for the court. Forensic acquiring and analysis
منابع مشابه
Forensic acquisition and analysis of magnetic tapes
Recovering evidential data from magnetic tapes in a forensically sound manner is a difficult task. There are many different tape technologies in existence today and an even greater number of archive formats used. This paper discusses the issues and challenges involved in the forensic acquisition and analysis of magnetic tapes. It identifies areas of slack space on tapes and discusses the challe...
متن کاملAcquiring forensic evidence from infrastructure-as-a-service cloud computing: Exploring and evaluating tools, trust, and techniques
We expose and explore technical and trust issues that arise in acquiring forensic evidence from infrastructure-as-aservice cloud computing and analyze some strategies for addressing these challenges. First, we create a model to show the layers of trust required in the cloud. Second, we present the overarching context for a cloud forensic exam and analyze choices available to an examiner. Third,...
متن کاملAnalysis of Cloud Digital Evidence
Cloud forensics analyzes digital evidence obtained from cloud computing environments. In the cloud, the traditional forensic focus of acquiring and analyzing snapshots of digital artifacts will becomes significantly less relevant as many of the artifacts are ephemeral, while the history of state changes become pervasive. This, over the medium-to-long term, the task of forensically reconstructin...
متن کاملForensic analysis of social networking applications on mobile devices
The increased use of social networking applications on smartphones makes these devices a goldmine for forensic investigators. Potential evidence can be held on these devices and recovered with the right tools and examination methods. This paper focuses on conducting forensic analyses on three widely used social networking applications on smartphones: Facebook, Twitter, and MySpace. The tests we...
متن کاملAcquiring OS X File Handles Through Forensic Memory Analysis
Memory analysis has become a critical capability in digital forensics because it provides insight into system state that cannot be fully represented through traditional media analysis. The volafox open source project has begun the work of structured memory analysis for OS X with support for a limited set of kernel structures. This paper addresses one memory analysis deficiency on OS X with the ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2003