Abstract
In digital investigations, many software and hardware components include possible forensic artifacts that can be searched for. The process however is not trivial and such search should be focused in the context of the forensic case.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsBibliography
Alsmadi I, Burdwell R, Aleroud A, Wahbeh A, Al-Qudah MA, Al-Omari A (2018) Introduction to information security. In: Practical information security. Springer, New York
Cheng BH et al (2009) Software engineering for self-adaptive systems: a research roadmap. In: Cheng BH, de Lemos R, Giese H, Inverardi P, Magee J (eds) Software engineering for self-adaptive systems. Springer, Berlin, pp 1–26. https://doi.org/10.1007/978-3-642-02161-9_1
Conlan K, Baggili I, Breitinger F (2016) Anti-forensics: furthering digital forensic science through a new extended, granular taxonomy. In: Proceedings of the 16th annual USA digital forensics research conference, DFRWS
Garfinkel S (2007) Anti-forensics: techniques, detection and countermeasure. Calhoun
Hargreaves CJ (2009) Assessing the reliability of digital evidence from live investigations involving encryption. PhD thesis, Cranfield University, Shrivenham
Harrell C (2012) Malware root cause analysis. Journey into Incident Response
Kaser R (2017) WikiLeaks reveals grasshopper, the CIA’s Windows hacking tool. https://thenextweb.com/security/2017/04/07/wikileaks-reveals-grasshopper-cias-windows-hacking-tool/
Kent K, Chevalier S, Grance T, Dang H (2006) Guide to integrating forensic techniques into incident response, NIST SP800-86
Kumar M (2017) This CIA tool hacks windows computers silently over the network. https://thehackernews.com/2017/06/windows-hacking-implant.html
Liu, Brown (2006) Bleeding-edge anti-forensics. Infosec world conference & expo, MIS Training Institute
Mandia K, Prosise C (2001) Incident response: investigating computer crime. Osborne/McGraw-Hill, Berkeley, pp 16–17
Noon RK (2001) Forensic engineering investigation, 1st edn. CRC Press, Boca Raton, p 1
Rogers M (2006) Anti-forensics: the coming wave in digital forensics. Accessed 7 Sept 2006
Tech (2009) Forensic analysis on the go, Deployable Forensics Lab makes crime-related investigations mobile, Tech, the newsletter of the first responder technologies program, volume 2, issue 3, March 2009.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Alsmadi, I. (2019). Forensics Analysis. In: The NICE Cyber Security Framework. Springer, Cham. https://doi.org/10.1007/978-3-030-02360-7_11
Download citation
DOI: https://doi.org/10.1007/978-3-030-02360-7_11
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-02359-1
Online ISBN: 978-3-030-02360-7
eBook Packages: EngineeringEngineering (R0)