- Digital Forensics and Incident Response
- Gerard Johansen
- 183字
- 2021-07-02 18:49:46
Collection
The collection element is where digital forensic examiners begin the process of acquiring the digital evidence. When examining digital evidence, it is important to understand the volatile nature of some of the evidence that an examiner will want to look at. Volatile evidence is evidence that can be lost when a system is powered down. For network equipment this could include active connections or log data that is stored on the device. For laptops and desktops, volatile data includes running memory or the Address Resolution Protocol cache. The Internet Engineering Task Force (IETF) has put together a document titled Guidelines forEvidence Collection and Archiving (RFC 3227) that addresses the order of volatility of digital evidence:
- Registers, cache
- Routing Table, ARP Cache, process table, kernel statistics, Memory (RAM)
- Temporary filesystems
- Disk
- Remote logging and monitoring data
- Physical configuration, network topology
- Archival media
It is imperative that digital forensic examiners take this volatility into account when starting the process of evidence collection. Methods should be employed where volatile evidence will be collected and moved to a non-volatile medium such as an external hard drive.
- Learning PostgreSQL
- Scratch 3.0少兒編程與邏輯思維訓(xùn)練
- Python高效開發(fā)實(shí)戰(zhàn):Django、Tornado、Flask、Twisted(第2版)
- C語言程序設(shè)計(jì)學(xué)習(xí)指導(dǎo)與習(xí)題解答
- OpenResty完全開發(fā)指南:構(gòu)建百萬級(jí)別并發(fā)的Web應(yīng)用
- Julia 1.0 Programming Complete Reference Guide
- Getting Started with Python and Raspberry Pi
- Deep Learning with R Cookbook
- OpenCV Android開發(fā)實(shí)戰(zhàn)
- 超簡單:用Python讓Excel飛起來(實(shí)戰(zhàn)150例)
- Mastering OAuth 2.0
- 川哥教你Spring Boot 2實(shí)戰(zhàn)
- Improving your Penetration Testing Skills
- PHP程序設(shè)計(jì)經(jīng)典300例
- iOS應(yīng)用逆向工程:分析與實(shí)戰(zhàn)