The Basics of Digital Forensics: The Primer for Getting Started in Digital Forensics

The Basics of Digital Forensics: The Primer for Getting Started in Digital Forensics

John Sammons

Language: English

Pages: 219


Format: PDF / Kindle (mobi) / ePub

The Basics of Digital Forensics provides a foundation for people new to the digital forensics field. This book teaches you how to conduct examinations by discussing what digital forensics is, the methodologies used, key technical concepts and the tools needed to perform examinations. Details on digital forensics for computers, networks, cell phones, GPS, the cloud, and Internet are discussed. Also learn how to collect evidence, document the scene, and how deleted data is recovered.
* Learn all about what Digital Forensics entails
* Build a toolkit and prepare an investigative plan
* Understand the common artifacts to look for during an exam

Selected Papers on Analysis of Algorithms

Wireless Network Security: Communication Technology

How to Count (Programming for Mere Mortals, Volume 1)

Smashing UX Design: Foundations for Designing Online User Experiences

Creating Mobile Apps with jQuery Mobile

Grace Hopper and the Invention of the Information Age (Lemelson Center Studies in Invention and Innovation)



















There are now tools and techniques that will capture volatile memory from a live machine in a forensically sound manner. With these advances, it's time to start recognizing the advantages of live collection. Advantage of Live Collection Until fairly recently, pulling the plug was the only real option. Capturing data in a running computer's main memory (RAM) wasn't a realistic option. The potential solutions that existed just weren't practical to be used in the field. In contrast,

recycle bin. Finally, you can right-click on an item and choose Delete. The benefit of putting files into the recycle bin is that we can dig through it and pull our files back out. I've worked in places where digging through office trash can be a pretty hazardous undertaking. Fortunately, things aren't nearly as dicey on our computers. As long as our files are still “in the can,” we can get them back. However, emptying the recycle bin (i.e., “taking out the trash”) makes recovery pretty much

sensitive information. Common attacks include hackers posing as employees, customers, or security consultants. These various attacks can also be conducted in combination, leveraging the vulnerabilities of both the technology and the people who control it. Network Fundamentals Networking or linking computers together has some distinct advantages. Sharing resources and collaboration are just two such benefits. A network has some basic necessities that are required regardless of its size or

effectively covering their tracks. Lastly, jurisdiction can create a substantial obstacle. The attacker's trail can literally traverse state, national, and international boundaries. Different legal jurisdictions, especially international ones, can have wildly different requirements for obtaining this sort of information. Different countries may also have very different views of cybercrime in general, which can result in a lack of cooperation (Morris, 2005). Additional Resources Training and

search for evidence, and the potential to validate data to more than one device is higher. Examiners will now have the extra challenge of investigating numerous devices and making sure that they protect the chain of custody and document the evidence in a thorough way. In Chapter 10, we're going to take a closer look at cell phones and the technology that powers them. We'll look at the types of networks as well as the components that form them. Cell phones are not the only mobile device with

Download sample