- Learning Network Forensics
- Samir Datt
- 156字
- 2021-07-16 12:58:51
Digital footprints
For a moment, let's flashback to the Locard's exchange principle section. To reiterate, it basically expounds that every contact leaves a trace. What this means, in the digital context, is that all interactions with the digital system/network will leave some sort of an artifact/data behind as evidence of this event. These artifacts are known as digital footprints. They are of the following two types:
- Passive
- Active
Passive digital footprints are created by the system without the knowledge of the user, such as in the case of pasting passwords from a file to an application evidence or copies can be found in the volatile memory. Cookies are another example of this.
The user creates active digital footprints deliberately, such as in the case of a Facebook post, sending an e-mail, or storing and transmitting pictures.
These will usually exist and can be recovered from the following:
- Device memory
- Disk space including logs
- Network traffic capture
- ClickHouse性能之巔:從架構設計解讀性能之謎
- 摩登創客:與智能手機和平板電腦共舞
- 零基礎學Scratch少兒編程:小學課本中的Scratch創意編程
- 編程珠璣(續)
- 軟件項目管理實用教程
- Elasticsearch for Hadoop
- 表哥的Access入門:以Excel視角快速學習數據庫開發(第2版)
- Python算法詳解
- HTML 5與CSS 3權威指南(第3版·上冊)
- 美麗洞察力:從化妝品行業看顧客需求洞察
- Processing開發實戰
- Learning Perforce SCM
- 中小企業網站建設與管理(靜態篇)
- 精通Oracle 12c 數據庫管理
- Mastering Android Application Development