- Digital Forensics and Incident Response
- Gerard Johansen
- 305字
- 2021-07-02 18:49:46
Identification
One principle that is often discussed in forensic science is the Locard's exchange principle. This principle postulates that when two objects come into contact, they leave a trace on each other. For example, if you walk into a house with carpeting, dirt from your shoes is left on the carpet and the carpet leaves fibers on the soles of your shoes. These traces that are exchanged form the bases of the science of trace evidence in the physical forensics world. In the digital world, we often have very similar trace evidence when two systems come into contact with each other. For example, if an individual browses to a website, the web server or web application firewall may record the individual's IP address within a collection log. The website may also deposit a cookie on the individual's laptop. Just as in the physical world, evidence exchanged in this manner may be temporary and our ability to observe it may be limited to the tools and knowledge we currently have.
This principle can guide the identification of potential sources of evidence during an incident. For example, if a CSIRT is attempting to determine the root cause of a malware infection on a system, they would start by analyzing the infected system. As some malware requires access to a C2 server, analysts can search firewall connection or proxy logs for any outbound traffic from the infected system to external IP addresses. A review of those connection IP addresses may reveal the C2 server, and potentially more details about the particular malware that has infected the system.
- C++ Primer習題集(第5版)
- 多媒體CAI課件設計與制作導論(第二版)
- Kubernetes實戰
- Web Scraping with Python
- 體驗設計原理:行為、情感和細節
- 云原生Spring實戰
- 老“碼”識途
- 零基礎學Python數據分析(升級版)
- Oracle Exadata專家手冊
- 微信小程序項目開發實戰
- Apache Camel Developer's Cookbook
- CryENGINE Game Programming with C++,C#,and Lua
- Java 9:Building Robust Modular Applications
- Mastering Unity Scripting
- Visual Basic 開發從入門到精通