Handbook of Digital Forensics and Investigation 2010
DOI: 10.1016/b978-0-12-374267-4.00004-5
|View full text |Cite
|
Sign up to set email alerts
|

Intrusion Investigation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
5
5

Relationship

0
10

Authors

Journals

citations
Cited by 32 publications
(9 citation statements)
references
References 2 publications
0
6
0
Order By: Relevance
“…Instead, SPN can represent a very valuable source of information during the ‘investigation’ phase, during which multiple hypotheses are formulated and validated. According to the scientific method applied to the digital forensics methodology [34], the investigation phase precedes the production of evidence and consists of the following steps: Data gathering and observation. Hypotheses formation. Hypotheses evaluation. Conclusions and reporting. Picture‐to‐identity linking results can conveniently be used during (2) and (3), that is, the formation of the hypotheses and their evaluation. In particular, it can be exploited to narrow the set of suspect identities in which the investigators concentrate their efforts to ultimately identify the culprit.…”
Section: Discussionmentioning
confidence: 99%
“…Instead, SPN can represent a very valuable source of information during the ‘investigation’ phase, during which multiple hypotheses are formulated and validated. According to the scientific method applied to the digital forensics methodology [34], the investigation phase precedes the production of evidence and consists of the following steps: Data gathering and observation. Hypotheses formation. Hypotheses evaluation. Conclusions and reporting. Picture‐to‐identity linking results can conveniently be used during (2) and (3), that is, the formation of the hypotheses and their evaluation. In particular, it can be exploited to narrow the set of suspect identities in which the investigators concentrate their efforts to ultimately identify the culprit.…”
Section: Discussionmentioning
confidence: 99%
“…Specifically, a Tableau Forensic USB 3.0 Bridge (T8u) running firmware version 2.1.0.3 was used. This device prevents any new data from being written to the drive while allowing the data present to be read [40]. The write blocker was connected to a computer and using FTK Imager 4.5.0.3 a segmented bit by bit copy of the drive was created.…”
Section: Methodsmentioning
confidence: 99%
“…The main focus is to measure the accuracy of discovering digital evidence related to the prevalent issue of defamation (Kusbiyanto, 2022). The static forensics method is used to identify and collect relevant evidence from Twitter accounts (Casey, 2009). Analysis tools such as Belkasoft Evidence Center X, Belkasoft Remote Acquisition, and Paraben's E3 Universal are applied in this study, with the hope of further uncovering cases of defamation on Twitter (Mukti, 2017).…”
Section: Introductionmentioning
confidence: 99%