scholarly journals MEMORY FORENSIC: ACQUISITION AND ANALYSIS OF MEMORY AND ITS TOOLS COMPARISON

Author(s):  
Mital Parekh ◽  
Snehal Jani

The enhancement of technology has led to a considerable amount of growth in number of cases pertaining to cyber-crime and has raised an enormous challenge to tackle it effectively.  There are various cyber forensic techniques and tools used to recover data from the devices to tackle cyber-crime. Present research paper focuses on performing memory forensic and analyzes the memory which contains many pieces of information relevant to forensic investigation, such as username, password, cryptographic keys, deleted files, deleted logs, running processes; that can be helpful to investigate the cyber-crime pining down the accused. The three main steps followed in memory forensic are acquiring, analyzing and recovering. Recovery of the evidences of crime from the volatile memory can be possible with the knowledge of different tools and techniques used in memory forensic.  However, it is always tough to analyze volatile memory as it stays for a very short period. Not all tools can be used for memory forensic in every situation and therefore, it is important to have the knowledge of tools before applying to solve a particular cyber-crime. It is yet to establish on using a single tool for complete investigation, however, most of the tools used are successful in providing reasonable evidences. The present research paper provides an insight on analyzing the memory that stores relevant data, collection of evidences from the device(s), extraction of essential data using different memory forensic tools, tools useful for various purposes and the best suited tool for a particular situation.                                      

2021 ◽  
Vol 4 (1) ◽  
pp. 43-54
Author(s):  
Kumarshankar Raychaudhuri ◽  
M. George Christopher ◽  
Nayeem Abbas Hamdani

Digital forensic investigation is the scientific process of collection, preservation, examination, analysis, documentation and presentation of digital evidence from digital devices, so that the evidence is in compliance with legal terms and acceptable in a court of law. Integrity of the digital evidence is an indispensable part of the investigation process and should be preserved to maintain the chain of custody. This is done through hashing technique using standardized forensic tools. However, while handling the evidences , lack of knowledge might lead to unintentional alteration of computed hash. This violates the chain of custody and makes the evidence inadmissible in a court of law. In this paper, our objective is to determine the different conditions under which the original hash value of a digital evidence changes. For this, we create different scenarios using sample data files and compute their hash values. A comparative study and analysis are done to determine in which scenario the original hash value of the data file changes. The results of the research will prove useful and essential for Criminal Justice Functionaries in gaining knowledge about various conditions leading to the change in hash value of digital evidence and therefore, avoid its accidental alteration during forensic investigation/examination.


Author(s):  
Prof. Sachin Babulal Jadhav

Digital crimes are taking place over the entire world. For any digital crime which commit at any part of world, computer or any electronic devices are used. The devices which are used to commit the crime are useful evidences which must be identified and protected for further use. The crimes involving electronic devices are called as cyber-crime. To investigate such crimes, a scientific procedures needs to be followed. The data collection, analysis, preservation and presentation of digital evidence is must in order investigate the cybercrime. This paper highlights the practices that are used worldwide in the investigation process of cyber-crime. Keywords: Digital Forensics, Analysis, Investigation, models of investigation.


Author(s):  
Hamid Jahankhani ◽  
Elidon Beqiri

Computer forensics is the discipline that deals with the acquisition, investigation, preservation and presentation of digital evidence in the court of law. Whereas anti-forensics is the terminology used to describe malicious activities deployed to delete, alter or hide digital evidence with the main objective of manipulating, destroying and preventing the creation of evidence .Various anti-forensic methodologies and tools can be used to interfere with digital evidence and computer forensic tools. However, memory-based anti-forensic techniques are of particular interest because of their effectiveness, advanced manipulation of digital evidence and attack on computer forensic tools. These techniques are mainly performed in volatile memory using advanced data alteration and hiding techniques. For these reasons memory-based anti-forensic techniques are considered to be unbeatable. This chapter aims to present some of the current anti-forensic approaches and in particular reports on memory-based anti-forensic tools and techniques.


2019 ◽  
Author(s):  
Eduard Klapwijk ◽  
Wouter van den Bos ◽  
Christian K. Tamnes ◽  
Nora Maria Raschle ◽  
Kathryn L. Mills

Many workflows and tools that aim to increase the reproducibility and replicability of research findings have been suggested. In this review, we discuss the opportunities that these efforts offer for the field of developmental cognitive neuroscience, in particular developmental neuroimaging. We focus on issues broadly related to statistical power and to flexibility and transparency in data analyses. Critical considerations relating to statistical power include challenges in recruitment and testing of young populations, how to increase the value of studies with small samples, and the opportunities and challenges related to working with large-scale datasets. Developmental studies involve challenges such as choices about age groupings, lifespan modelling, analyses of longitudinal changes, and data that can be processed and analyzed in a multitude of ways. Flexibility in data acquisition, analyses and description may thereby greatly impact results. We discuss methods for improving transparency in developmental neuroimaging, and how preregistration can improve methodological rigor. While outlining challenges and issues that may arise before, during, and after data collection, solutions and resources are highlighted aiding to overcome some of these. Since the number of useful tools and techniques is ever-growing, we highlight the fact that many practices can be implemented stepwise.


2019 ◽  
Vol 4 (1) ◽  
pp. e001061 ◽  
Author(s):  

Severe acute respiratory infections (SARI) remain one of the leading causes of mortality around the world in all age groups. There is large global variation in epidemiology, clinical management and outcomes, including mortality. We performed a short period observational data collection in critical care units distributed globally during regional peak SARI seasons from 1 January 2016 until 31 August 2017, using standardised data collection tools. Data were collected for 1 week on all admitted patients who met the inclusion criteria for SARI, with follow-up to hospital discharge. Proportions of patients across regions were compared for microbiology, management strategies and outcomes. Regions were divided geographically and economically according to World Bank definitions. Data were collected for 682 patients from 95 hospitals and 23 countries. The overall mortality was 9.5%. Of the patients, 21.7% were children, with case fatality proportions of 1% for those less than 5 years. The highest mortality was in those above 60 years, at 18.6%. Case fatality varied by region: East Asia and Pacific 10.2% (21 of 206), Sub-Saharan Africa 4.3% (8 of 188), South Asia 0% (0 of 35), North America 13.6% (25 of 184), and Europe and Central Asia 14.3% (9 of 63). Mortality in low-income and low-middle-income countries combined was 4% as compared with 14% in high-income countries. Organ dysfunction scores calculated on presentation in 560 patients where full data were available revealed Sequential Organ Failure Assessment (SOFA) scores on presentation were significantly associated with mortality and hospital length of stay. Patients in East Asia and Pacific (48%) and North America (24%) had the highest SOFA scores of >12. Multivariable analysis demonstrated that initial SOFA score and age were independent predictors of hospital survival. There was variability across regions and income groupings for the critical care management and outcomes of SARI. Intensive care unit-specific factors, geography and management features were less reliable than baseline severity for predicting ultimate outcome. These findings may help in planning future outbreak severity assessments, but more globally representative data are required.


2018 ◽  
Vol 196 ◽  
pp. 04082
Author(s):  
Zuzana Florkova ◽  
Lukas Duris ◽  
Michal Veselovsky ◽  
Stefan Sedivý ◽  
Dasa Kovalova

The paper focuses on the issue of the use of three-dimensional mobile mapping system and the following processing of obtained data. The first part is devoted to the description of the three-dimensional mobile mapping technology using LiDAR, specifically to the mobile three-dimensional scanner - Lynx SG1 from Teledyne OPTECH. It describes into more details the process of works from the field data collection to their so called "postprocessing" as well as a variety of output options and interpretations of results obtained in the measurements. Advantages of the system together with its limits of use are summarized in the conclusion of the research paper.


Sign in / Sign up

Export Citation Format

Share Document