Science topic
Computer Forensics - Science topic
Explore the latest questions and answers in Computer Forensics, and find Computer Forensics experts.
Questions related to Computer Forensics
this is a problem of when using ftk to image a drive in computer forensics
Need two articles on topics dealing with my major, Computer Forensics and Digital Security to present to my fellow classmates and to hand in to my professor by the 26th. Any information and good articles are appredciated!! I am very new to all this, so I don't even know if I am in the right place, as I am 32 years old and starting college a little later than most. I have no idea what I am doing. Any and all help is appreciated! Thank you!
Please guide me on how can I find a topic for my thesis and where to start work.
Hello I am looking for ideas for my final year project in the cyber security field. I am mostly interested in something in Networking, computer forensics, or blockchain technologies.
recent hot area of research in the field of cyber forensics
Smartphones are fast becoming an ubiquitous device used throughout the day to undertake a variety of activities which may have been traditionally completed using a PC. What are the implications in the rise of smartphones for forensic practitioners?
Im looking to base my research on OSINT and building a suspect profile. Any leads about current research or researchers would help.
Thanks
Talking about a multi-platform digital forensic software that supports computer and smartphones, including tablets.
I need the database of digital crimes committed especially for cases already established may be in a court of law.
In the case of file digital evidence resulting from the acquisition and imaging of electronic device, is there any metadata standard used to be applied to digital evidence. Are there any similar research that discusses about metadata (standard / specification / schema / element) for digital evidence ?
Recently I have visited one the website published a data in row and column in pdf file format. I have noticed that after two days later on the data has been changed in one of the cells but file name is remain same.
My question is that
1. Can we check the date of medication of the file and any track record of the changes sequence with valid proof?
2. Is there any computer forensic tool or software to check the modification or overwrite the file details of the website?
Not to be confused with the path when we recieve the email, but like when we send it.
I'm working on a scenario where an email with an attachment was sent using Thunderbird. I'm using Free MBOX File Viewer for the info of the email, yet only the filename is mentioned and not the full path.
Besides searching the computer to find the file using the filename, is there any way to find the original path of the attachment?
From what I searched till now, there's nothing mentioned about the full path, only the filename.
Hi everyone
Consider that we have a communication system using spreading sequence, what parameter(s) does measure the robustness of system against the attack on the spreading codes?
for example there is a file(may be a word, pdf or any other) in a server, when ever a user read or write that file, user id and operation should be recorded.
I have been trying to extract meta data from various types of files. I am looking for attributes that are available for any type of file format so that I can use them for clustering. I need suggestions for selecting attributes. Please suggest me some meta data that is available for all kinds of files. If the data are numeric that would be better. Thanks.
I want to know some latest issues in terms of privacy due to data publishing or data mining in real example that happened after 2013. I have some example like
Google bypass safari browser privacy bypass issue
Max Schrems against Facebook.
Please share if you know some more example
It seems that not much work has been done regarding proposing frameworks on forensic investigations in cloud computing.
So far what I found is:
1- McKemmish suggestion on 1999
2- NIST suggestion 2006
3- Integrated conceptual digital forensic framework for cloud computing Ben and Kim 2012
Does anyone here know any other related frameworks? Kindly include them (title/URL) in your reply .
CSP knows which VM is created by which user. It also knows how and where evidence is stored. If CSP is providing the total information then cloud forensics is the same as computer forensics. What is challenging in cloud forensics? Will cloud forensics be the same as computer forensics?
I am interested in buying forensic softwares, please suggest along with vendors and prices. Thank you.
Recent technological advances in mobile phones and the development of smart phones has led to increased use and dependence on the mobile phone.
The duration of the programme could be one year (Two semesters).