Computer Forensics: Investigations of the Future
نویسنده
چکیده
I Passwords and Their Hashes . . . . . . . . 5 Abstract—Computer Forensics is a new field that uses traditional investigation processes and applies them to investigating a computer for digital evidence. In this paper, we will discuss the background of computer forensics and process of a digital investigation of a computer. Technical topics such cryptographic hashing and data hiding will be covered as well. Additionally, we will perform a demonstration of a basic computer investigation on a forensic image of a hard drive. To conclude the paper, we will discuss the future implications of cloud storage and solid-state drives on the field of computer forensics, and where the field will head in the coming years.
منابع مشابه
A Framework for Digital Forensics and Investigations: The Goal-Driven Approach
Digital forensics investigations are an important task for collecting evidence based on the artifacts left in computer systems for computer related crimes. The requirements of such investigations are often a neglected aspect in most of the existing models of digital investigations. Therefore, a formal and systematic approach is needed to provide a framework for modeling and reasoning about the ...
متن کاملFramework for Next Generation Digital Forensics Models
Digital Forensics is a fairly new discipline, which due to the heavy overlap with the computer science and information technology is now categorized within the computer science field. On the other hand, the legal side of digital forensics is mainly coming from the traditional forensics procedures and the law. Therefore, the current models are modeling the process of digital investigation to be ...
متن کاملFuture of Digital Forensics: A Survey of Available Training
The field of forensics is multidisciplinary by nature, founded on the disciplines of criminology and information technology. However, most course work leading to a foundation in the field are offered within the Chemistry and Biology disciplines in addition to Computer Science. Regardless of the framework in which the courses are offered, the coursework itself must address social, legal, and eth...
متن کاملAvoiding Cyber-attacks to DMZ and Capturing Forensics from Intruders Using Honeypots
Nowadays, honeypots are widely used to divert attackers from the original target and keep them busy within a decoy environment. DeMilitarized Zone (DMZ) is an important zone for network administrators, because many of the services to the public network is provided at this zone. Many of the security tools such as firewalls, intrusion detection systems and several other secu...
متن کاملToward Understanding the Challenges and Countermeasures in Computer Anti-Forensics
The term computer anti-forensics (CAF) generally refers to a set of tactical and technical measures intended to circumvent the efforts and objectives of the field of computer and network forensics (CF). Many scientific techniques, procedures, and technological tools have evolved and effectively applied in the field of CF to assist scientists and investigators in acquiring and analyzing digital ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2014