2005
DOI: 10.21236/ada443483
|View full text |Cite
|
Sign up to set email alerts
|

First Responders Guide to Computer Forensics

Abstract: The ideas and findings in this report should not be construed as an official DoD position. It is published in the interest of scientific and technical information exchange. FOR THE COMMANDER

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0
1

Year Published

2007
2007
2022
2022

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 25 publications
(13 citation statements)
references
References 6 publications
0
12
0
1
Order By: Relevance
“…The Forensics begins initially by extracting and analysis of hidden evidence. Hidden evidence comes in different forms, evidence recovered from the blood by examining the DNA and fingerprints left at the crime scene to the files on computer storage devices [1]. Computer forensics is also known as cyber-forensics which is the major application of computer investigation and analysis techniques to collect very strong proofs based on real facts and figures for presentation in a court of law.…”
Section: Forensics and Computer Forensicmentioning
confidence: 99%
“…The Forensics begins initially by extracting and analysis of hidden evidence. Hidden evidence comes in different forms, evidence recovered from the blood by examining the DNA and fingerprints left at the crime scene to the files on computer storage devices [1]. Computer forensics is also known as cyber-forensics which is the major application of computer investigation and analysis techniques to collect very strong proofs based on real facts and figures for presentation in a court of law.…”
Section: Forensics and Computer Forensicmentioning
confidence: 99%
“…This inaccuracy in computer-generated timestamps is "natural", that is to say, it is the result of the normal operation of the computer system. The solution for addressing this issue suggested most frequently in the literature is to note the system clock time of a computer under investigation at the time of its examination and to determine the discrepancy between that time and the time of a reference clock (Boyd and Forster, 2004;Nolan et al, 2005). However, this solution does not address the issue of clock skew varying over time prior to the examination of the computer system, and it is this variance which may lead to inaccuracies in timelines.…”
Section: Related Workmentioning
confidence: 99%
“…During incident response, in order to gain insight about system state, one might issue several commands and catalog the responses. Typical response may include creating more than thirty processes [3]. The more detailed the responses, the more accurate the portrayal of the system state, but the portrayal depends upon the granularity of the tools and the accurate recording and interpretation of the tool output.…”
Section: The Case For Copying Rammentioning
confidence: 99%
“…On the other hand, while pulling the plug does preserve the current contents of the hard disk drive, it allows little or no insight into what operations the system was performing at the time when the power was removed. In light of this lack of knowledge, others have provided incident response steps to perform in order to gain insight about the state of the system (Nolan et al [3], among others).…”
Section: Introductionmentioning
confidence: 99%