Skip to main content

Forensics Analysis

  • Chapter
  • First Online:
  • 1520 Accesses

Abstract

In digital investigations, many software and hardware components include possible forensic artifacts that can be searched for. The process however is not trivial and such search should be focused in the context of the forensic case.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   79.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Bibliography

  • Alsmadi I, Burdwell R, Aleroud A, Wahbeh A, Al-Qudah MA, Al-Omari A (2018) Introduction to information security. In: Practical information security. Springer, New York

    Chapter  Google Scholar 

  • Cheng BH et al (2009) Software engineering for self-adaptive systems: a research roadmap. In: Cheng BH, de Lemos R, Giese H, Inverardi P, Magee J (eds) Software engineering for self-adaptive systems. Springer, Berlin, pp 1–26. https://doi.org/10.1007/978-3-642-02161-9_1

    Chapter  Google Scholar 

  • Conlan K, Baggili I, Breitinger F (2016) Anti-forensics: furthering digital forensic science through a new extended, granular taxonomy. In: Proceedings of the 16th annual USA digital forensics research conference, DFRWS

    Google Scholar 

  • Garfinkel S (2007) Anti-forensics: techniques, detection and countermeasure. Calhoun

    Google Scholar 

  • Hargreaves CJ (2009) Assessing the reliability of digital evidence from live investigations involving encryption. PhD thesis, Cranfield University, Shrivenham

    Google Scholar 

  • Harrell C (2012) Malware root cause analysis. Journey into Incident Response

    Google Scholar 

  • Kaser R (2017) WikiLeaks reveals grasshopper, the CIA’s Windows hacking tool. https://thenextweb.com/security/2017/04/07/wikileaks-reveals-grasshopper-cias-windows-hacking-tool/

  • Kent K, Chevalier S, Grance T, Dang H (2006) Guide to integrating forensic techniques into incident response, NIST SP800-86

    Google Scholar 

  • Kumar M (2017) This CIA tool hacks windows computers silently over the network. https://thehackernews.com/2017/06/windows-hacking-implant.html

  • Liu, Brown (2006) Bleeding-edge anti-forensics. Infosec world conference & expo, MIS Training Institute

    Google Scholar 

  • Mandia K, Prosise C (2001) Incident response: investigating computer crime. Osborne/McGraw-Hill, Berkeley, pp 16–17

    Google Scholar 

  • Noon RK (2001) Forensic engineering investigation, 1st edn. CRC Press, Boca Raton, p 1

    Google Scholar 

  • Rogers M (2006) Anti-forensics: the coming wave in digital forensics. Accessed 7 Sept 2006

    Google Scholar 

  • Tech (2009) Forensic analysis on the go, Deployable Forensics Lab makes crime-related investigations mobile, Tech, the newsletter of the first responder technologies program, volume 2, issue 3, March 2009.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Alsmadi, I. (2019). Forensics Analysis. In: The NICE Cyber Security Framework. Springer, Cham. https://doi.org/10.1007/978-3-030-02360-7_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-02360-7_11

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-02359-1

  • Online ISBN: 978-3-030-02360-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics