Preview

Digital Forensics

Good Essays
Open Document
Open Document
672 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Digital Forensics
Introduction and background information:
Digital forensics is a branch of forensic science involving the recovery and investigation of material found in digital devices used in crimes or by criminals. In the past 15 years it has expanded greatly with all the advances in technology but much of the new technology has not been studied yet. The research I am doing is important because if the study is successful in the future many forensic departments could use my research to solve crimes.

Key terms:
Jump lists- A feature that allows you to view documents in a recent program that is on your taskbar.
Windows 10- A version of Microsoft's operating system that was launched after Windows 8.
LNK file- A type of Microsoft Windows Shortcut Files with the
…show more content…
Can solve cold cases.

Future focus of research in this topic:
Find ways to integrate jump lists into solving modern crimes.
Finding faster ways to parse metadata including jump lists.
Finding new ways to gain information from a criminal's devices.

Results of related research:
Larson T. - Jump lists are saved into two different sections, Automatic and Custom witch are both stored in different subdirectories.
Lyness R.- Jump List data is stored in Compound Binary files.
MSDN - All the sector types are eventually linked back to the header sector, except for the range lock sector and unallocated free sectors.

Analysis of related research:
Larson T.- Using the different sections we can analyze when each app is used and what the user was doing.
Lyness R.- The data for jump lists will all be in one large file so it is easier to access it and it will be easier to find specific variables.
MSDN- The data is all linked together so it can all be managed from one header and all the files are managed by the range lock sector which is located separate of the header so it can see the changes made to the files to see if anyone is trying to tamper with digital

You May Also Find These Documents Helpful

  • Satisfactory Essays

    NT2640 Lab Outline

    • 672 Words
    • 4 Pages

    RIP Configuration I - Page 70 6. RIP Configuration II - Page 72 7. RIP Verification I - Page 76 8. RIP-2 Configuration I - Page 78 9. RIP Auto-summary - Page 91 10.…

    • 672 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    When you copy a file to a library, Windows Explorer writes the file to the folder designated as the save location.…

    • 453 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    6.07 Forensics

    • 287 Words
    • 2 Pages

    2. It is important because it is society that scientists can out together, they have what they need.…

    • 287 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Cis 417 Assignment 1

    • 755 Words
    • 4 Pages

    There are many challenges for a computer forensics specialist and everyone faces the same challenges. There first challenge is to find a way to examine an increasing number of digital devices, each containing an immense volume of data, in a timely manner with limited resources (Charles L Cohen, n.d.). Another challenge is the fact that offenders are finding easier ways to store data. They…

    • 755 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    17. This type of list is a good choice for a glossary or FAQ list: <dl>…

    • 335 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    forensics

    • 449 Words
    • 2 Pages

    What physical evidence did you find at the victim’s home? A box of matches, a space heater, beer bottles, Natalie’s wallet, a V-shaped burn pattern, burned outlet, a protected surface on the ground, crazed glass, and a puddle-shaped burn pattern.…

    • 449 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Forensics

    • 320 Words
    • 2 Pages

    • There were bloodstains on a shirt, and they found the pair of pants in his room.…

    • 320 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    After the preservation phase, forensics are required to locate and identify any evidence that can be used to aid the crime case. There are several locations where evidence are usually found such as in the hard drive on the user’s personal computer, laptop, smart phone or tablet (ACPO, 2012). It is also critical that forensics are aware of the intention of the particular investigation. This aids in the forensics' efforts of locating digital evidences that are relevant to the case. For example, in the case of a server intrusion, forensics should look out for signs such as a rootkit installation, analyze configuration files, logs files and etc. These are possible locations and processes where traces of evidence can be picked out from (Carrier and Spafford, 2003).…

    • 257 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    It 210

    • 2960 Words
    • 12 Pages

    Chances are that you frequently use lists in your daily life. The following is a common example:…

    • 2960 Words
    • 12 Pages
    Powerful Essays
  • Good Essays

    Evidence is a type of proof. It is usually used to prove someone innocent or guilty. There are many different types of evidence, such as: testimony, direct, circumstantial, and physical evidence. However, according to the article “Forensic: Evidence, Clues, and Investigation” by Andrea Campbell, forensic evidence is the best evidence to present at a court case or trial.…

    • 226 Words
    • 1 Page
    Good Essays
  • Good Essays

    Computers, Technology and Criminal Justice Information Systems, Kaplan University Unit 6 Project. Professor Erik Bernoldt What is crime analysis anyway? Crime analysis is a systematic process of collecting, categorizing, analyzing, and disseminating timely, accurate, and useful information that describes crime pattern, crime trends, and potential suspects. Computers, Technology and Criminal Justice Information Systems Professor Erik Bernholdt Unit 6- Technology and Crime Analysis By: Sierra Spangenberg What is crime analysis anyway?…

    • 745 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Forensic Science is the examination of criminal evidence for the criminal justice system in order to successfully prosecute a criminal.…

    • 479 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Since the term anti-forensics appeared, a number of related methods have been proposed. Peron and Legary proposed a four categories anti-forensics approach saying that a criminal or a suspect could use data wiping, data hiding, manipulating or preventing the creation of evidence. Dr Rogers also proposed four categories that are data hiding, artifact wiping, trail obfuscation and attacks against the process/tools.…

    • 128 Words
    • 1 Page
    Good Essays
  • Satisfactory Essays

    Using the indexing of the content, common file types throughout the drive can be categorized in one location rather than the user locating the desired folders/files.…

    • 250 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    The increasing amount of modern technologies we have in the U.S. have greatly changed the way law enforcement agents operate on the field today. According to Edwards (2015), “Computers are used to hold databases of information, to run sophisticated software that can recognize faces or identify fingerprints and to connect to the Web, an avenue for communication and a rich source of intelligence.” As you can see, computer technologies are essential in the criminal justice system.…

    • 192 Words
    • 1 Page
    Satisfactory Essays