2021
DOI: 10.46729/ijstm.v2i4.256
|View full text |Cite
|
Sign up to set email alerts
|

Computer Forensic Using Photorec for Secure Data Recovery Between Storage Media: a Proof of Concept

Abstract: Data plays the important role, so that data recovery and data security be prioritized. Computer users often lose their data due to personal errors or by attacks. Digital forensics has one sub-field called computer forensic, which has an important role in the process of secure data recovery. USB Flashdisk as the most widely used storage media has a probability of data loss. It is necessary to do computer forensic actions, especially secure data recovery, on it so that it can restore data securely to other media… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 5 publications
0
2
0
Order By: Relevance
“…Social media, cloud networking and storage encryption methods and Internet of Things are few new technologies in the world of computer science and we all know that it takes a long time for any new field to mature into an exact science. In addition, each subject's beliefs and practices are contested and tested over time before being approved or disapproved based on established scientific criteria [35][36][37].…”
Section: Sub-fields Of Digital Forensics Are Diverse and Rapidly Evol...mentioning
confidence: 99%
“…Social media, cloud networking and storage encryption methods and Internet of Things are few new technologies in the world of computer science and we all know that it takes a long time for any new field to mature into an exact science. In addition, each subject's beliefs and practices are contested and tested over time before being approved or disapproved based on established scientific criteria [35][36][37].…”
Section: Sub-fields Of Digital Forensics Are Diverse and Rapidly Evol...mentioning
confidence: 99%
“…including image storage, file data hashing, data visualization, and data carving on damaged images. However, most of these tools are paid for [5]. Due to the limited inspection features, the extracted data cannot be ported directly to the circuit to extract additional evidence.…”
Section: Introductionmentioning
confidence: 99%