86
Handbook of Digital Forensics of Multimedia Data and Devices
Acknowledgements
Part of this chapter was funded by the UK Home Office’s Centre for Applied Science
and Technology (CAST) through its research project ‘Digital Forensics: Scenarios
and Standards’ between 2011 and 2012. The authors would like to thank Mr. Ahmad
al-Natour who was a research assistant of the UK Home Office funded project and
contributed to its final report which covers many standards and best practice guides in
this chapter.
References
AccessData Group, LLC 2013 AccessData BootCamp, http://marketing.accessdata.com/acton/
attachment/4390/f-044b/1/-/-/-/-/ADBootCamp07-08-2013.pdf (Accessed 17 February 2015).
ASTM International 2009 Standard guide for education and training in computer forensics, ASTM
E2678-09, http://www.astm.org/Standards/E2678.htm (Accessed 17 February 2015).
ASTM International 2010 Standard practice for computer forensics, ASTM E2763-10, http://www.astm.
org/Standards/E2763.htm (Accessed 17 February 2015).
ASTM International 2012 Standard guide for forensic digital image processing, ASTM E2825-12,
http://www.astm.org/Standards/E2825.htm (Accessed 17 February 2015).
Ayers R, Jansen W, Cilleros N and Daniellou R 2005 Cell phone forensic tools: An overview and analysis,
NIST Interagency Report 7250, http://csrc.nist.gov/publications/nistir/nistir-7250.pdf (Accessed 17
February 2015).
Ayers R, Jansen W, Moenner L and Delaitre A 2007 Cell phone forensic tools: An overview and
analysis update, NIST Interagency Report 7387, http://csrc.nist.gov/publications/nistir/nistir-7387.pdf
(Accessed 17 February 2015).
Ayers R, Brothers S and Jansen W 2014 Guidelines on mobile device forensics, NIST Special
Publication 800-101 Revision 1, http://www.nist.gov/manuscript-publication-search.cfm?pub_id=
915021 (Accessed 17 February 2015).
Beckett J and Slay J 2011 Scientific underpinnings and background to standards and accreditation in
digital forensics.
Digital Investigation
8
(2), 114–121.
Brenner SW and Frederiksen BA 2002 Computer searches and seizures: Some unresolved issues.
Michigan Telecommunications and Technology Law Review
8
(12), 39–114.
Brezinski D and Killalea T 2002 Guidelines for evidence collection and archiving, IETF RFC 3227,
http://tools.ietf.org/html/rfc3227 (Accessed 17 February 2015).
BSI 2008a Evidential weight and legal admissibility of electronic information – Specification,
BS 10008:2008, http://shop.bsigroup.com/ProductDetail/?pid=000000000030172973 (Accessed 17
February 2015).
BSI 2008b Evidential weight and legal admissibility of electronic information. compliance
workbook for use with BS 10008, BIP 0009:2008, http://shop.bsigroup.com/ProductDetail/?pid=
000000000030186720 (Accessed 17 February 2015).
BSI 2008c Evidential weight and legal admissibility of information stored electronically. code of practice
for the implementation of BS 10008, BIP 0008-1:2008, http://shop.bsigroup.com/ProductDetail/?pid=
000000000030186227 (Accessed 17 February 2015).
BSI 2008d Evidential weight and legal admissibility of information transferred electronically. code
of practice for the implementation of BS 10008, BIP 0008-2:2008, http://shop.bsigroup.com/
ProductDetail/?pid=000000000030186228 (Accessed 17 February 2015).
BSI 2008e Evidential weight and legal admissibility of linking electronic identity to documents.
code of practice for the implementation of BS 10008, BIP 0008-3:2008, http://shop.bsigroup.com/
ProductDetail/?pid=000000000030186229 (Accessed 17 February 2015).
“c02” — 2015/6/19 — 20:53 — page 87 — #50
Standards and Best Practices in Digital and Multimedia Forensics
Do'stlaringiz bilan baham: |