In this primary work we call for the importance of integrating security testing into the process of testing digital forensic tools. We postulate that digital forensic tools are increasing in features (such as network imaging), becoming networkable, and are being proposed as forensic cloud services. This raises the need for testing the security of these tools, especially since digital evidence integrity is of paramount importance. At the time of conducting this work, little to no published anti-forensic research had focused on attacks against the forensic tools/process.We used the TD3, a popular, validated, touch screen disk duplicator and hardware write blocker with networking capabilities and designed an attack that corrupted the integrity...
Best practices in digital forensics demand the use of write-blockers when creating forensic images o...
Traditional digital forensics techniques are becoming obsolete due to rapid technological change. Pr...
© IAER 2019In the modern socially-driven, knowledge-based virtual computing environment in which org...
AbstractIn this primary work we call for the importance of integrating security testing into the pro...
Information technology systems are attacked by offenders using digital devices and networks to facil...
Anti-forensic tools, techniques and methods are becoming a formidable obstacle for the digital foren...
Finding, acquiring, processing, analyzing, and reporting data on electronically stored data is the m...
The rise of computer use and technical adeptness by the general public in the last two decades are u...
The Sixth International Conference on Innovative Computing Technology (INTECH 2016), Irish Computer ...
The area of digital forensics might be old but the idea that criminals or other organisations are ac...
AbstractAnti-forensic tools, techniques and methods are becoming a formidable obstacle for the digit...
Computer crimes have become very complex in terms of investigation and prosecution. This is mainly b...
The term digital forensics was first coined as a synonym for computer forensics. Since then, it hase...
There are an abundance of measures available to the standard digital device users which provide the ...
The tendency to use technologies without fully understanding the potential ramifications extends to ...
Best practices in digital forensics demand the use of write-blockers when creating forensic images o...
Traditional digital forensics techniques are becoming obsolete due to rapid technological change. Pr...
© IAER 2019In the modern socially-driven, knowledge-based virtual computing environment in which org...
AbstractIn this primary work we call for the importance of integrating security testing into the pro...
Information technology systems are attacked by offenders using digital devices and networks to facil...
Anti-forensic tools, techniques and methods are becoming a formidable obstacle for the digital foren...
Finding, acquiring, processing, analyzing, and reporting data on electronically stored data is the m...
The rise of computer use and technical adeptness by the general public in the last two decades are u...
The Sixth International Conference on Innovative Computing Technology (INTECH 2016), Irish Computer ...
The area of digital forensics might be old but the idea that criminals or other organisations are ac...
AbstractAnti-forensic tools, techniques and methods are becoming a formidable obstacle for the digit...
Computer crimes have become very complex in terms of investigation and prosecution. This is mainly b...
The term digital forensics was first coined as a synonym for computer forensics. Since then, it hase...
There are an abundance of measures available to the standard digital device users which provide the ...
The tendency to use technologies without fully understanding the potential ramifications extends to ...
Best practices in digital forensics demand the use of write-blockers when creating forensic images o...
Traditional digital forensics techniques are becoming obsolete due to rapid technological change. Pr...
© IAER 2019In the modern socially-driven, knowledge-based virtual computing environment in which org...