Comparative Study and Simulation of Digital Forensic Tools
نویسندگان
چکیده
The cyber crimes such as online banking fraud, credit card theft, child pornography, intellectual property theft, identity theft, unauthorized intrusion, money laundering, digital piracy etc. are growing rapidly with technology. Desktops, smartphones, laptops, digital cameras, GPS devices and even watches all can be used to aid a fraud. All this devices leave behind a digital footprint. Gathering electronic evidence and preserving it requires a special set of deliberations. Without a complete understanding of digital forensics, evidence could be compromise and which may cause evidence inadmissible in the court. To analyze the digital crime, the forensic technique is used. It is use to track where exactly the crime has been taken place and where the valuable data is hidden. To analyze the data and to recover the deleted or hidden data from the digital devices, the digital forensic tools are used. Paper presents the comparison of three digital forensic tools WinHex, Active file recovery, and ProDiscover Basic based on the parameters such as File examination, Log examination, Deleted File Indexing, Memory Dump Analysis, supported file systems, supported disk images.
منابع مشابه
Quadrature Amplitude Modulated Digital Radio Transmission Modeling and Simulation
Computer aided design and computer aided modeling tools are becoming increasingly important in the design and performance evaluation of communication systems. In this work, we report on the computer simulation modeling study of terrestrial digital microwave radio transmission, using Block Oriented System Simulator package (BOSS). The work concentrates on semi-analytical error rate evaluation in...
متن کاملAn overview and analysis of PDA forensic tools
Mobile handheld devices are becoming evermore affordable and commonplace in society. When they are involved in a security incident or crime, forensic specialists require tools that allow proper extraction and speedy examination of any digital evidence present. This paper gives an overview of forensic software tools for Personal Digital Assistants (PDA). A set of generic scenarios was devised to...
متن کاملSignificance of Hash Value Generation in Digital Forensic: A Case Study
–Digital forensics tools frequently use to calculate the hash value of digital evidence drive. MD5 and SHA hash function is used in digital forensic tools to calculate and verify that a data set has not been altered, due to the application of various evidence collection and analysis tools and procedures. Additionally, due to the impact on the personal life of the subject of an investigation, ve...
متن کاملAnalyzing registry, log files, and prefetch files in finding digital evidence in graphic design applications
The products of graphic design applications leave behind traces of digital information which can be used during a digital forensic investigation in cases where counterfeit documents have been created. This paper analyzes the digital forensics involved in the creation of counterfeit documents. This is achieved by first recognizing the digital forensic artifacts left behind from the use of graphi...
متن کاملFormulating optimal marketing scenarios by Agent Based simulation approach (Case study: Tejarat Bank)
In recent years, the banking industry has witnessed great changes in the field of competition, which has led to the rise of market share and the attraction of customer concern to many of the managers in the banking industry. In the same vein, banks are always struggling to achieve a desirable position by utilizing new approaches to marketing in a competitive environment. Due to this importance,...
متن کامل