12.01.2015 Views

Editorial & Advisory Board - Acta Technica Corviniensis

Editorial & Advisory Board - Acta Technica Corviniensis

Editorial & Advisory Board - Acta Technica Corviniensis

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

ACTA TECHNICA CORVINIENSIS – Bulletin of Engineering<br />

• Identify encryption before pulling the plug.<br />

• Plug and play bootable USB devices<br />

• Identify data stored remotely.<br />

Imaging technology<br />

• Data stored in a hybrid of logical and physical<br />

formats<br />

• The file item becomes the atomic unit rather<br />

than the drive.<br />

• Data reduction techniques to reduce the size of<br />

the image.<br />

• Selective logical imaging of user data.<br />

In the laboratory<br />

• Forensics data mining tools are front ends for<br />

large SQL database.<br />

• Distributed grid data processing architecture<br />

• Data mining searches performed via index<br />

engines.<br />

• Multi‐user model ‐ Investigators, examiners,<br />

paralegals, work in the data at the same time<br />

sharing files, notes, bookmarks, etc.<br />

• Heavy emphasis on e‐mail and Internet artifacts<br />

• Emphasis on timelines<br />

• Emphasis on data visualization<br />

CONCLUSIONS<br />

Each year, there is a constant increase in the number<br />

of digital crimes worldwide. As technology evolves,<br />

software improves, and computer users become more<br />

qualified, the crimes they commit are becoming more<br />

sophisticated. Law enforcement is in a perpetual<br />

struggle with these criminals to limit their<br />

opportunities. Part of this intention includes<br />

developing tools that have the ability to systematically<br />

search digital devices for pertinent evidence. As more<br />

and more devices become digitalized, tool<br />

development should also progress to include these, as<br />

well. In parallel with technological development, it is<br />

necessary to ensure the development of adequate<br />

forensic methodology which must be applicable to all<br />

current digital crimes, as well as any unrealized crimes<br />

of the future. This paper aimed to identify some of the<br />

most important directions of development trends and<br />

forensic solutions. Also, through two popular market<br />

products, the overview of actual forensic trends is<br />

presented. It may be noted that live analysis in realtime<br />

prevailed over traditional post‐mortem analysis,<br />

and that network environment investigation became<br />

increasingly dominant condition for forensic software.<br />

REFERENCES<br />

[1.] Caloyannides, M.A.: Computer Forensics and Privacy,<br />

Artech House, Inc. (2001)<br />

[2.] Digital Forensics Research Workshop, “A Road Map<br />

for Digital Forensics Research”, 2001., Available:<br />

www.dfrws.org (current October 2011)<br />

[3.] USLegal ‐ Definitions, Available:<br />

http://definitions.uslegal.com/d/digital‐evidence<br />

(current October 2011)<br />

[4.] Pfeilsticker, M., Starnes, R.: Digital Forensics, Exodus<br />

Communications,<br />

Available:<br />

http://www.guug.de/veranstaltungen/ffg2002/paper<br />

s/ffg2002‐pfeilsticker.pdf (current October 2011)<br />

[5.] Harrison, W.: Developing an Undergraduate Course<br />

in Digital Forensics, PSU Center for Information<br />

Assurance, Portland State University, Available:<br />

http://www.ccsc.org/northwest/2006/ppt/forensicst<br />

utorialHARRISON.pdf (current June 2011)<br />

[6.] Kruse, W., Heiser, J.G.: Computer Forensics: Incident<br />

Response Essentials, Addison‐Wesley, (2002)<br />

[7.] National Institute of Justice: Electronic Crime Scene<br />

Investigation. A Guide for First Responders, 2001,<br />

Available:<br />

http://www.ncjrs.org/pdffiles1/nij/187736.pdf<br />

(current June 2011)<br />

[8.] Van Solms, S.H., Lourens, C.P.: A Control Framework<br />

for Digital Forensics, IFIP 11.9, (2006)<br />

[9.] Reith, M., Carr, C., Gunsch, G.: An Examination of<br />

Digital Forensic Models, International Journal of<br />

Digital Evidence, Volume 1, Issue 3, (2002)<br />

[10.] Department of Justice, Computer Crime and<br />

Intellectual Property Section (CCIPS), Cybercrime<br />

Lab, http://www.cybercrime.gov (current June 2011)<br />

[11.] Kleiman, D.: The Official CHFI Exam 312‐49: For<br />

Computer Hacking Forensics Investigators, Available:<br />

www.syngress.com (current October 2011)<br />

[12.] EnCase Forensic, www.guidancesoftware.com<br />

(current September 2011)<br />

[13.] WetStone Technologies, www.wetstonetech.com<br />

(current September 2011)<br />

ACTA TECHNICA CORVINIENSIS – BULLETIN of ENGINEERING<br />

ISSN: 2067‐3809 [CD‐Rom, online]<br />

copyright © UNIVERSITY POLITEHNICA TIMISOARA,<br />

FACULTY OF ENGINEERING HUNEDOARA,<br />

5, REVOLUTIEI, 331128, HUNEDOARA, ROMANIA<br />

http://acta.fih.upt.ro<br />

2012. Fascicule 2 [April–June] 91

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!