Digital forensic science [electronic resource] : issues, methods, and challenges / Vassil Roussev.
- [San Rafael, California] : Morgan & Claypool, 2017.
- Synthesis digital library of engineering and computer science.
Synthesis lectures on information security, privacy, and trust ; # 19.
Synthesis lectures on information security ; privacy ; and trust ; # 19
1 online resource (xiii, 141 pages) : illustrations.
- Forensic sciences -- Data processing.
Computer crimes -- Investigation.
- System Details:
- Mode of access: World Wide Web.
System requirements: Adobe Acrobat Reader.
- Digital forensic science, or digital forensics, is the application of scientific tools and methods to identify, collect, and analyze digital (data) artifacts in support of legal proceedings. From a more technical perspective, it is the process of reconstructing the relevant sequence of events that have led to the currently observable state of a target IT system or (digital) artifacts. Over the last three decades, the importance of digital evidence has grown in lockstep with the fast societal adoption of information technology, which has resulted in the continuous accumulation of data at an exponential rate. Simultaneously, there has been a rapid growth in network connectivity and the complexity of IT systems, leading to more complex behavior that needs to be investigated. The goal of this book is to provide a systematic technical overview of digital forensic techniques, primarily from the point of view of computer science. This allows us to put the field in the broader perspective of a host of related areas and gain better insight into the computational challenges facing forensics, as well as draw inspiration for addressing them. This is needed as some of the challenges faced by digital forensics, such as cloud computing, require qualitatively different approaches; the sheer volume of data to be examined also requires new means of processing it.
- 1. Introduction
1.1 Scope of this book
2. Brief history
2.1 Early years (1984-1996)
2.2 Golden age (1997-2007)
2.3 Present (2007-)
3. Definitions and models
3.1 The Daubert standard
3.2 Digital forensic science definitions
3.2.1 Law-centric definitions
3.2.2 Working technical definition
3.3 Models of forensic analysis
3.3.1 Differential analysis
3.3.2 Computer history model
3.3.3 Cognitive task model
4. System analysis
4.1 Storage forensics
4.1.1 Data abstraction layers
4.1.2 Data acquisition
4.1.3 Forensic image formats
4.1.4 Filesystem analysis
4.1.5 Case study: FAT32
4.1.6 Case study: NTFS
4.1.7 Data recovery and file content carving
4.1.8 File fragment classification
4.2 Main memory forensics
4.2.1 Memory acquisition
4.2.2 Memory image analysis
4.3 Network forensics
4.4 Real-time processing and triage
4.4.1 Real-time computing
4.4.2 Forensic computing with deadlines
4.5 Application forensics
4.5.1 Web browser
4.5.2 Cloud drives
4.6 Cloud forensics
4.6.1 Cloud basics
4.6.2 The cloud forensics landscape
4.6.3 IaaS forensics
4.6.4 SaaS forensics
5. Artifact analysis
5.1 Finding known objects: cryptographic hashing
5.2 Block-level analysis
5.3 Efficient hash representation: Bloom filters
5.4 Approximate matching
5.4.1 Content-defined data chunks
5.5 Cloud-native artifacts
6. Open issues and challenges
6.2 Visualization and collaboration
6.3 Automation and intelligence
6.4 Pervasive encryption
6.5 Cloud computing
6.5.1 From SaaP to SaaS
6.5.2 Separating cloud services from their implementation
6.5.3 Research challenges
6.6 Internet of things (IoT)
- Part of: Synthesis digital library of engineering and computer science.
Title from PDF title page (viewed on January 24, 2017).
Includes bibliographical references (pages 125-140).
- Other format:
- Print version:
- Publisher Number:
- 10.2200/S00738ED1V01Y201610SPT019 doi
- Access Restriction:
- Restricted for use by site license.
|Location||Notes||Your Loan Policy|
|Description||Status||Barcode||Your Loan Policy|