Cyber Crime and Cyber Terrorism



Download 5,67 Mb.
Pdf ko'rish
bet86/283
Sana19.05.2022
Hajmi5,67 Mb.
#604880
1   ...   82   83   84   85   86   87   88   89   ...   283
Bog'liq
Cyber crime and cyber terrorism investigators handbook by Babak

FORENSIC ANALYSIS
A forensic investigator is usually given some remit into the purpose of the investi-
gation, for example, what crime the suspect may be responsible for. Often though, 
the information shared may not be so specific. The reason for an investigator be-
ing given a narrow remit is to prevent the potential for prior knowledge bias. For 
example, an investigator may simply be asked to supply evidence that the profile 
of a machine is one which is setup up for malicious hacking, or they may be asked 
to find evidence to support the supposition that a particular online persona and the 
suspect are one and the same. In such circumstances it is often desirable to ensure 


79
 
Ram analysis
that the evidence found is without bias, and that it is found independently of case 
specifics (see Chapter 8).
While the focus of the forensic investigation will be governed by the remit pre-
sented, in most cases the digital evidence collected will be composed of one or more 
of the artifacts listed in 
Table 7.1
.
The methods for how these artifacts are discovered will be discussed in the fol-
lowing sections.
ANTI-FORENSICS
Malicious hackers are becoming increasingly aware of forensic analysis methods. 
As a result they often implement counter measures to prevent an investigator har-
vesting useful evidence. This practice is referred to as anti-forensics, or sometimes 
counter forensics. In essence the practice involves eliminating or obfuscating evi-
dence relating to criminal activity or malicious intent. With this in mind, the pri-
mary focus of this section is to discuss hard disk media storage forensics, with a 
focus on identifying where to uncover evidence stored in obscurely formatted areas 
of the media; areas which are either immune to anti-forensics or which simply may 
not have been considered by the suspect. Typical forensic analysis techniques are 
also discussed briefly in this section, and due to the increasing tolerance of courts 
in accepting RAM analysis as admissible, this too is discussed (see Chapter 8).
RAM ANALYSIS
If a RAM dump was taken from the image then it should be analyzed on a separate 
machine to avoid evidence contamination. There are many tools which can be used 
for RAM analysis; worthy of note is the tool Volatility, which is gaining a reputation 

Download 5,67 Mb.

Do'stlaringiz bilan baham:
1   ...   82   83   84   85   86   87   88   89   ...   283




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish