Secrets and Lies: Digital Security in a Networked World
Secrets and Lies: Digital Security in a Networked World
Forensic Discovery
Computer Forensics: Computer Crime Scene Investigation (Networking Series) (Networking Series)
Computer Forensics: Computer Crime Scene Investigation (Networking Series) (Networking Series)
Handbook of Digital Forensics and Investigation
Handbook of Digital Forensics and Investigation
Open source: main issues discussed last OSDOC
Proceedings of the Workshop on Open Source and Design of Communication
Hi-index | 0.00 |
This article provides an overview of the basic digital forensic process. In different contexts of crime, the use of "computer forensics" is a usual way to gather evidence. Digital data is collected and analyzed in order to be presented in court as evidence of illegal activities. This is already a first-line option in most cases for criminal investigation. For some types of crime, particularly economic and financial research focuses on the storage devices. In the context of a crime, create and certify a full Image of suspect devices is vital to preserve its integrity. The disk image, take sector by sector copy usually for forensic purposes, and as such will contain some mechanism (internal verification) to prove that the copy is accurate and has not changed. In this work we present some Open Source tools to perform an effective role in computer forensics, which ensure the realization of these images, fulfilling all the requirements, so that any evidence recovered from his analysis, may be admitted in court.