- Digital Forensics and Incident Response
- Gerard Johansen
- 183字
- 2021-07-02 18:49:46
Collection
The collection element is where digital forensic examiners begin the process of acquiring the digital evidence. When examining digital evidence, it is important to understand the volatile nature of some of the evidence that an examiner will want to look at. Volatile evidence is evidence that can be lost when a system is powered down. For network equipment this could include active connections or log data that is stored on the device. For laptops and desktops, volatile data includes running memory or the Address Resolution Protocol cache. The Internet Engineering Task Force (IETF) has put together a document titled Guidelines forEvidence Collection and Archiving (RFC 3227) that addresses the order of volatility of digital evidence:
- Registers, cache
- Routing Table, ARP Cache, process table, kernel statistics, Memory (RAM)
- Temporary filesystems
- Disk
- Remote logging and monitoring data
- Physical configuration, network topology
- Archival media
It is imperative that digital forensic examiners take this volatility into account when starting the process of evidence collection. Methods should be employed where volatile evidence will be collected and moved to a non-volatile medium such as an external hard drive.
- Advanced Quantitative Finance with C++
- JavaScript高效圖形編程
- 控糖控脂健康餐
- Raspberry Pi for Secret Agents(Third Edition)
- AIRAndroid應用開發實戰
- Learning OpenStack Networking(Neutron)(Second Edition)
- Creating Stunning Dashboards with QlikView
- Learning VMware vSphere
- Python一行流:像專家一樣寫代碼
- Python第三方庫開發應用實戰
- 零基礎學SQL(升級版)
- 每個人的Python:數學、算法和游戲編程訓練營
- C#網絡編程高級篇之網頁游戲輔助程序設計
- Learning Zimbra Server Essentials
- Python程序設計現代方法