Cyber Crime and Cyber Terrorism



Download 5,67 Mb.
Pdf ko'rish
bet100/283
Sana19.05.2022
Hajmi5,67 Mb.
#604880
1   ...   96   97   98   99   100   101   102   103   ...   283
Bog'liq
Cyber crime and cyber terrorism investigators handbook by Babak

Digital Media Wiping:
A proper wiping of the media that contain the digital 
evidence, will simply disappear the evidence.
• 
Steganography:
Someone can use Steganography to hide a file inside another 
and make the investigator unable to take advantage of the evidence, since the 
last might not find a way to extract it.
• 
Privacy Wipers:
These are tools aim to delete any privacy traces from 
operating systems, applications or both. If properly used the investigator might 
find no evidence at all inside the digital media.
• 
Rootkits:
Rootkits can subvert the operating system kernel and even react 
to forensic acquisition processes by hijacking the way the operating system 
uses areas like process management or memory management to extract the 
evidence.
• 
S.M.A.R.T. Anti-Forensics:
This kind of technology can be used by an 
attacker to suspect if a hard drive has been taken out for a forensic duplication 
process.
• 
Homographic Attacks:
Such an attack can mislead an investigator since some 
letters that look similar to the human eye can be replaced with others in such a 
way to make a malicious file look legitimate.
• 
File Signature Modification Attacks:
Someone can purposefully change the 
file signature of a file to make it look something else.
• 
Encryption:
This can be used almost in every anti-forensic stage in order to 
obscure and make unreadable and unusable the evidence.
• 
Metadata Anti-Forensics:
Information about data (metadata) can be altered in 
order to hide user actions.


95
 
Digital anti forensics tools and approaches
• 
Slack Space Anti-Forensics:
Someone can hide malicious software in areas 
that operating system might not use, like slack space, because they might be 
considered as reserved or empty.
• 

Download 5,67 Mb.

Do'stlaringiz bilan baham:
1   ...   96   97   98   99   100   101   102   103   ...   283




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish