Abstract 3
Digital forensics 4
Network forensics 4
Anti-forensics Techniques 7
Mobile Device Forensics 9 File Carving 10
Conclusion 12
Bibliography 13
Abstract
Digital forensics is an emerging discipline that focuses on the acquisition, recovery, documentation, and analysis of information contained within and created with computer systems. These methods and methodologies are used typically to figure out what happened, when it happened, how it happened, and who was involved.
The rapid growth of the internet has made it easier to commit traditional crimes by providing criminals an alternate method for launching attacks with relative anonymity. Effects of such technology has been great but , with the ever changing complexity of the communication and networking infrastructure is making investigation of the crimes difficult. Clues to solving a case might be hidden in large volumes of data that needs to be sifted through in order to detect crimes and collect evidence.
This is only the tip of the iceberg and we are starting to realize that digital forensics plays a very important part in areas such as Corporations, law enforcement, network security, and information assurance. As digital forensics starts to encompass our daily lives, we should pay close attention in how certain techniques such as Network Forensics, Anti-forensics Techniques, Mobile Device Forensics, and File Carving are being adopted. I will explore the benefits of these four techniques and if they have added value to Information Assurance as it relates to Forensic Support. Or is there a real problem with the standardization of how data is collected and stored.
Digital forensics is known as evidence being collected for court cases, corporate investigations or personal uses. The collected information is extremely sensitive to alteration and therefore must be handled very carefully. Much of the work to date in digital forensics has focused on data extraction.
Bibliography: Ayers, R. (2008, Spring). Mobile Device Forensics. Retrieved July 31, 2010, from http://www.cftt.nist.gov/documents/MobileDeviceForensics-MFW08.pdf Caloyannides, Michael A. Computer Forensics and Privacy. Artech House, Inc. 2001. Digital Forensics Research Workshop. “A Road Map for Digital Forensics Research” 2001. www.dfrws.org GRENIER, C. (2009, April). PhotoRec. Retrieved July 31, 2010, from http://www.cgsecurity.org/wiki/PhotoRec Namikus. (2010, Spring). Foremost. Retrieved July 31, 2010, from http://foremost.sourceforge.net NIKSUN. (2010, Spring). NIKSUN NetDetector. Retrieved July 31, 2010, from http://www.niksun.com/product.php?id=4 Palmer, Gary. “Forensic Analysis in a Digital World.” 2002. Richard, G. G. (2006, Spring). Scalpel: A Frugal, High Performance File Carver. Retrieved July 31,2010, from http://www.digitalforensicssolutions.com/Scalpel/ Visualware Inc. (2010, Winter). Visual IP Trace. Retrieved July 31, 2010, from http://www.visualiptrace.com