2008
DOI: 10.1145/1368506.1368508
|View full text |Cite
|
Sign up to set email alerts
|

The role of operating systems in computer forensics

Abstract: Computer forensics is a multidisciplinary field concerned with the examination of computer systems which have been involved in criminal activity, either as an object or a tool of a crime. The aim of the investigator is to find information relevant to the case in question, as well as the chain of events leading to the creation of this information. In other words the questions to be answered are "What incriminating information is present in the system?" and "How did the incriminating information get there?"

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2009
2009
2015
2015

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 0 publications
0
3
0
Order By: Relevance
“…In the forensic analysis of a desktop or laptop, the operating system provides a significant amount of information; the greater part of useful information we require is either generated by or contained within the operating system (Huebner & Henskens, 2008). Access to a particular system or device for forensic analysis could be at one of three levels:…”
Section: Embedded Devices and The Forensic Processmentioning
confidence: 99%
“…In the forensic analysis of a desktop or laptop, the operating system provides a significant amount of information; the greater part of useful information we require is either generated by or contained within the operating system (Huebner & Henskens, 2008). Access to a particular system or device for forensic analysis could be at one of three levels:…”
Section: Embedded Devices and The Forensic Processmentioning
confidence: 99%
“…change of permission, user logon/logoff etc. The Windows operating system has many places from where evidence can be extracted [14][15].…”
Section: Fig 1: Shows the Interaction Of A Win32 Program With The Evementioning
confidence: 99%
“…It stores this activity in some areas such as Windows Registry. Since, the plethora information, such as user accounts, typed URLs, shared network, and run command history, are stored in it [9][10][11][12]. The investigator can extract some useful data relevant to the case under investigation, such as the last accessed web site, the type of plugged in device, and some other data.…”
Section: Introductionmentioning
confidence: 99%