![]() AUDIT's capabilities as an intelligent digital assistant are evaluated through a series of experiments comparing it with a human investigator as well as against standard benchmark disk images. We also present a new hierarchical disk investigation model which leads AUDIT to systematically examine the disk in its totality based on its physical and logical structures. Our system design and implementation of AUDIT intelligently integrates open source tools and guides non-IT professionals while requiring minimal technical knowledge about the disk structures and file systems of the target disk image. ![]() ![]() In this dissertation, we present AUDIT, a novel automated disk investigation toolkit that supports investigations conducted by non-expert (in IT and disk technology) and expert investigators. This makes it difficult for investigators without some computer science background to easily conduct the needed disk analysis. The relevant tools are also often open source requiring additional technical knowledge and proper configuration. However, these digital forensics tools are often difficult to use, usually task specific, and generally require professionally trained users with IT backgrounds. Software tools designed for disk analysis play a critical role today in digital forensics investigations. In this paper will be discussed about exploratory experiments on the use of anti-forensic techniques to counteract the digital forensic methods and effect obtained by the use of anti-forensic investigation of the process of digital evidence by digital forensics, and techniques that can be used as well as digital forensic tool that can be used in the forensic process. With the growth of technology, the development of science to the field of forensic computer science is also developing very rapidly, so there is a wide range of computer forensic techniques to counteract these so-called anti-forensic to handle the case where the computer forensik was abused by irresponsible parties. ![]() In the good side of digital forensics is very useful for dealing with electronic crime, but what if the method is performed by a digital forensic criminal, the criminal can easily dig up the information it needs simply by using live forensics method to the target. As we know electronic crime is very difficult to investigate because it relies heavily on information contained on electronic evidence. However, due to the different techniques applied by computer users, it is hard to find people who use anti-computer forensics.ĭigital forensics is a new field of science and is growing rapidly, digital forensics gather and examine evidence from crime electronic electronics. With the help of modern operating systems, especially by the nature of management of data, events, and information, it is easy to find these individuals. Innovatively, there are anti-investigation techniques, aimed at making information collected by automated tools as well as fresh-and-blood investigators. As such, computer forensics identifies the discipline involved in the study of the techniques and methodologies necessary for collection, analysis and presentation of unequivocal evidence, necessary in legal proceedings. ![]() Computer forensics department holds the mandate of collecting as much information and documentation about a crime as possible, regardless of whether such information is computer related or not. Mostly, these techniques hide or make it unrecoverable digital tracks of a crime in any form of magnetic media. This paper takes an overview of, and an analysis of the most widely used anti-forensic techniques in the world. There has been a wide usage of anti-computer forensics all over the world. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |