ABSTRAK iv TABLE OF CONTENTS v LIST OF TABLES viii LIST OF FIGURES ix LIST OF ABBREVIATIONS xiv L... more ABSTRAK iv TABLE OF CONTENTS v LIST OF TABLES viii LIST OF FIGURES ix LIST OF ABBREVIATIONS xiv LIST OF APPENDICES xv 1 vi 2.4 Data Layers 2.5 Device Files 2.6 Unused Disk Areas 2.7 Host Protected Area 2.8 The Extended File System 2.9 Existing Guidelines 2.9.1 Guide to Integrating Forensic Techniques into Incident response 2.9.2 Forensic Examination of Digital Evidence: A Guide for First Responders, Second Edition 2.9.3 Forensic Examination of Digital Evidence: A Guide for Law Enforcement 2.9.4 Good Practice Guide for Computer-Based Electronic Evidence v4 2.9.5 New Technologies Incorporated, Computer Evidence Processing Steps 2.9.6 Computer Security Incident Handling Guide 2.9.7 SWGDE Guidelines 2.10 Linux Forensic Tools 2.10.1 General Command Line Utilities 2.10.2 The gparted Command 2.10.3 The hdparm Command 2.10.4 The badblocks Command 2.10.5 The dd Command 2.10.6 The fdisk Command 2.10.7 The mawk Command 2.10.8 The md5sum, sha1sum and sha256sum Commands 2.10.9 The grep Command 2.10.10 The find Command 2.10.11 The ls Command 2.11 The Sleuth Kit Tools 2.11.1 Non-categorized Tools 2.11.2 The File System Layer vii 2.11.3 The Content Layer Tools 2.11.4 The Metadata Layer Tools 2.11.5 The File Name Layer Tools 2.11.6 The Application Layer Tools 2.11.7 The sigfind Tool 2.12 Caine Live Cd RESEARCH METHODOLOGY
ABSTRAK iv TABLE OF CONTENTS v LIST OF TABLES viii LIST OF FIGURES ix LIST OF ABBREVIATIONS xiv L... more ABSTRAK iv TABLE OF CONTENTS v LIST OF TABLES viii LIST OF FIGURES ix LIST OF ABBREVIATIONS xiv LIST OF APPENDICES xv 1 vi 2.4 Data Layers 2.5 Device Files 2.6 Unused Disk Areas 2.7 Host Protected Area 2.8 The Extended File System 2.9 Existing Guidelines 2.9.1 Guide to Integrating Forensic Techniques into Incident response 2.9.2 Forensic Examination of Digital Evidence: A Guide for First Responders, Second Edition 2.9.3 Forensic Examination of Digital Evidence: A Guide for Law Enforcement 2.9.4 Good Practice Guide for Computer-Based Electronic Evidence v4 2.9.5 New Technologies Incorporated, Computer Evidence Processing Steps 2.9.6 Computer Security Incident Handling Guide 2.9.7 SWGDE Guidelines 2.10 Linux Forensic Tools 2.10.1 General Command Line Utilities 2.10.2 The gparted Command 2.10.3 The hdparm Command 2.10.4 The badblocks Command 2.10.5 The dd Command 2.10.6 The fdisk Command 2.10.7 The mawk Command 2.10.8 The md5sum, sha1sum and sha256sum Commands 2.10.9 The grep Command 2.10.10 The find Command 2.10.11 The ls Command 2.11 The Sleuth Kit Tools 2.11.1 Non-categorized Tools 2.11.2 The File System Layer vii 2.11.3 The Content Layer Tools 2.11.4 The Metadata Layer Tools 2.11.5 The File Name Layer Tools 2.11.6 The Application Layer Tools 2.11.7 The sigfind Tool 2.12 Caine Live Cd RESEARCH METHODOLOGY
Uploads
Papers by Amin Maree