- Digital Forensics and Incident Response
- Gerard Johansen
- 183字
- 2021-07-02 18:49:46
Collection
The collection element is where digital forensic examiners begin the process of acquiring the digital evidence. When examining digital evidence, it is important to understand the volatile nature of some of the evidence that an examiner will want to look at. Volatile evidence is evidence that can be lost when a system is powered down. For network equipment this could include active connections or log data that is stored on the device. For laptops and desktops, volatile data includes running memory or the Address Resolution Protocol cache. The Internet Engineering Task Force (IETF) has put together a document titled Guidelines forEvidence Collection and Archiving (RFC 3227) that addresses the order of volatility of digital evidence:
- Registers, cache
- Routing Table, ARP Cache, process table, kernel statistics, Memory (RAM)
- Temporary filesystems
- Disk
- Remote logging and monitoring data
- Physical configuration, network topology
- Archival media
It is imperative that digital forensic examiners take this volatility into account when starting the process of evidence collection. Methods should be employed where volatile evidence will be collected and moved to a non-volatile medium such as an external hard drive.
- 基于粒計算模型的圖像處理
- Angular UI Development with PrimeNG
- Java加密與解密的藝術(第2版)
- 區塊鏈:以太坊DApp開發實戰
- Mastering LibGDX Game Development
- Web Application Development with MEAN
- Python機器學習經典實例
- Symfony2 Essentials
- Hands-On Automation Testing with Java for Beginners
- 劍指Java:核心原理與應用實踐
- Java并發編程之美
- 遠方:兩位持續創業者的點滴思考
- Hacking Android
- Web開發新體驗
- PHP 7 Programming Blueprints