- Learning Network Forensics
- Samir Datt
- 156字
- 2021-07-16 12:58:51
Digital footprints
For a moment, let's flashback to the Locard's exchange principle section. To reiterate, it basically expounds that every contact leaves a trace. What this means, in the digital context, is that all interactions with the digital system/network will leave some sort of an artifact/data behind as evidence of this event. These artifacts are known as digital footprints. They are of the following two types:
- Passive
- Active
Passive digital footprints are created by the system without the knowledge of the user, such as in the case of pasting passwords from a file to an application evidence or copies can be found in the volatile memory. Cookies are another example of this.
The user creates active digital footprints deliberately, such as in the case of a Facebook post, sending an e-mail, or storing and transmitting pictures.
These will usually exist and can be recovered from the following:
- Device memory
- Disk space including logs
- Network traffic capture
- 微服務設計(第2版)
- Learn ECMAScript(Second Edition)
- MATLAB圖像處理超級學習手冊
- Mastering Natural Language Processing with Python
- Java從入門到精通(第5版)
- Android 9 Development Cookbook(Third Edition)
- 薛定宇教授大講堂(卷Ⅳ):MATLAB最優化計算
- Learning Raspbian
- 從零開始學C語言
- ASP.NET程序開發范例寶典
- Flowable流程引擎實戰
- MINECRAFT編程:使用Python語言玩轉我的世界
- Unity 2018 Augmented Reality Projects
- C++17 By Example
- HTML5與CSS3權威指南