Microsoft Vista: Serious Challenges for Digital Investigations

نویسنده

  • Darren R. Hayes
چکیده

Microsoft’s Vista (“Vista”) can be seen as a dramatic departure from previous versions of the vendor’s operating systems, in terms of security and file systems. This vendor’s technical advances in security have created problems for law enforcement and other computer forensics investigators. This paper will illustrate how changes to Vista’s file systems will impede the retrieval of inculpatory evidence by prosecutors; the discovery of digital evidence on a system is more problematic in a Vista environment. The successful conviction of a defendant is reliant upon a prosecutor effectively demonstrating control, ownership and intent relating to the data found on the perpetrator’s computer. However, a machine running Vista is likely to negatively impact these findings. This paper will seek to guide the forensics investigator through the plethora of Vista operating system changes and provide suggestions for alternative methods of data discovery.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Introducing the Microsoft Vista event log file format

Several operating systems provide a central logging service which collects event messages from the kernel and applications, filters them and writes them into log files. Since more than a decade such a system service exists in Microsoft Windows NT. Its file format is well understood and supported by forensic software. Microsoft Vista introduces an event logging service which entirely got newly d...

متن کامل

Implementing Boot Control for Windows Vista

A digital forensic logging system must prevent the booting of unauthorized programs and the modification of evidence. Our previous research developed Dig-Force2, a boot control system for Windows XP platforms that employs API hooking and a trusted platform module. However, Dig-Force2 cannot be used for Windows Vista systems because the hooked API cannot monitor booting programs in user accounts...

متن کامل

Serving Scientists Worldwide

s Editors: Kari Mielikäinen, Harri Mäkinen and Mauri Timonen A bs tr ct s — W or ld D en dr o 20 10 The 8th International Conference on Dendrochronology June 13 – 18, 2010, Rovaniemi, Finland Serving Scientists Worldwide since 1991 More details at www.regentinstruments.com [email protected] • Fax: 418-653-1357 • REGENT INSTRUMENTS INC. Image Analysis Systems for Plant Science Based on...

متن کامل

Usability of Windows Vista Firewall: A Laboratory User Study

In this project we conducted a user study of Microsoft Windows Vista Firewall: a lab study followed by a questionnaire to evaluate the usability of Vista’s personal firewall. Our results show that the main problem with Windows Vista Firewall is that many users are unable to open the Advanced Management Interface of Windows Vista Firewall. Our overall impression was that users were relatively un...

متن کامل

Cyber Dumpster-Diving: $Recycle.Bin Forensics for Windows 7 and Windows Vista

Analysis of deleted files often provides useful information for the forensic computer examiner. Knowing where to find the deleted files, and how to interpret the metadata associated with the file’s deletion, make up the cornerstone of a successful forensic computer examination. Much like an office trash-can, the Microsoft Windows Recycle Bin is a temporary holding container for files that have ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008