- Learning Network Forensics
- Samir Datt
- 156字
- 2021-07-16 12:58:51
Digital footprints
For a moment, let's flashback to the Locard's exchange principle section. To reiterate, it basically expounds that every contact leaves a trace. What this means, in the digital context, is that all interactions with the digital system/network will leave some sort of an artifact/data behind as evidence of this event. These artifacts are known as digital footprints. They are of the following two types:
- Passive
- Active
Passive digital footprints are created by the system without the knowledge of the user, such as in the case of pasting passwords from a file to an application evidence or copies can be found in the volatile memory. Cookies are another example of this.
The user creates active digital footprints deliberately, such as in the case of a Facebook post, sending an e-mail, or storing and transmitting pictures.
These will usually exist and can be recovered from the following:
- Device memory
- Disk space including logs
- Network traffic capture
- 測試驅(qū)動開發(fā):入門、實戰(zhàn)與進階
- Instant 960 Grid System
- 匯編語言程序設計(第2版)
- INSTANT CakePHP Starter
- Hands-On Reinforcement Learning with Python
- Python Data Analysis Cookbook
- C/C++程序員面試指南
- Learning jQuery(Fourth Edition)
- HTML5權(quán)威指南
- Android群英傳
- Django 5企業(yè)級Web應用開發(fā)實戰(zhàn)(視頻教學版)
- PyQt編程快速上手
- Vue.js光速入門及企業(yè)項目開發(fā)實戰(zhàn)
- Learning ECMAScript 6
- Python程序設計教程