Computer Forensics: Investigations of the Future

نویسنده

  • Spencer Hanson
چکیده

I Passwords and Their Hashes . . . . . . . . 5 Abstract—Computer Forensics is a new field that uses traditional investigation processes and applies them to investigating a computer for digital evidence. In this paper, we will discuss the background of computer forensics and process of a digital investigation of a computer. Technical topics such cryptographic hashing and data hiding will be covered as well. Additionally, we will perform a demonstration of a basic computer investigation on a forensic image of a hard drive. To conclude the paper, we will discuss the future implications of cloud storage and solid-state drives on the field of computer forensics, and where the field will head in the coming years.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Framework for Digital Forensics and Investigations: The Goal-Driven Approach

Digital forensics investigations are an important task for collecting evidence based on the artifacts left in computer systems for computer related crimes. The requirements of such investigations are often a neglected aspect in most of the existing models of digital investigations. Therefore, a formal and systematic approach is needed to provide a framework for modeling and reasoning about the ...

متن کامل

Framework for Next Generation Digital Forensics Models

Digital Forensics is a fairly new discipline, which due to the heavy overlap with the computer science and information technology is now categorized within the computer science field. On the other hand, the legal side of digital forensics is mainly coming from the traditional forensics procedures and the law. Therefore, the current models are modeling the process of digital investigation to be ...

متن کامل

Future of Digital Forensics: A Survey of Available Training

The field of forensics is multidisciplinary by nature, founded on the disciplines of criminology and information technology. However, most course work leading to a foundation in the field are offered within the Chemistry and Biology disciplines in addition to Computer Science. Regardless of the framework in which the courses are offered, the coursework itself must address social, legal, and eth...

متن کامل

Avoiding Cyber-attacks to DMZ and Capturing Forensics from Intruders Using Honeypots

Nowadays, honeypots are widely used to divert attackers from the original target and keep them busy within a decoy environment. DeMilitarized Zone (DMZ) is an important zone for network administrators, because many of the services to the public network is provided at this zone. Many of the security tools such as firewalls, intrusion detection systems and several other secu...

متن کامل

Toward Understanding the Challenges and Countermeasures in Computer Anti-Forensics

The term computer anti-forensics (CAF) generally refers to a set of tactical and technical measures intended to circumvent the efforts and objectives of the field of computer and network forensics (CF). Many scientific techniques, procedures, and technological tools have evolved and effectively applied in the field of CF to assist scientists and investigators in acquiring and analyzing digital ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014