• ثبت نام
    • ورود به سامانه
    مشاهده مورد 
    •   صفحهٔ اصلی
    • نشریات انگلیسی
    • The ISC International Journal of Information Security
    • Volume 4, Issue 2
    • مشاهده مورد
    •   صفحهٔ اصلی
    • نشریات انگلیسی
    • The ISC International Journal of Information Security
    • Volume 4, Issue 2
    • مشاهده مورد
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Analyzing registry, log files, and prefetch files in finding digital evidence in graphic design applications

    (ندگان)پدیدآور
    Mabuto, E.Venter, H.
    Thumbnail
    دریافت مدرک مشاهده
    FullText
    اندازه فایل: 
    1.329 مگابایت
    نوع فايل (MIME): 
    PDF
    نوع مدرک
    Text
    ORIGINAL RESEARCH PAPER
    زبان مدرک
    English
    نمایش کامل رکورد
    چکیده
    The products of graphic design applications leave behind traces of digital information which can be used during a digital forensic investigation in cases where counterfeit documents have been created. This paper analyzes the digital forensics involved in the creation of counterfeit documents. This is achieved by first recognizing the digital forensic artifacts left behind from the use of graphic design applications, and then analyzing the files associated with these applications. When analyzing digital forensic artifacts generated by an application, the specific focus is on determining whether the graphic design application was installed, whether the application was used, and determining whether an association can be made between the application's actions and such a digital crime. This is accomplished by locating such information from the registry, log files and prefetch files. The file analysis involves analyzing files associated with these applications for file signatures and metadata. In the end it becomes possible to determine if a system has been used for creating counterfeit documents or not.
    کلید واژگان
    Digital Evidence
    Digital Forensics
    Digital Forensic Artifacts
    Graphic Design Applications

    شماره نشریه
    2
    تاریخ نشر
    2012-07-01
    1391-04-11
    ناشر
    Iranian Society of Cryptology

    شاپا
    2008-2045
    2008-3076
    URI
    https://dx.doi.org/10.22042/isecure.2013.4.2.5
    http://www.isecure-journal.com/article_39131.html
    https://iranjournals.nlai.ir/handle/123456789/73411

    مرور

    همه جای سامانهپایگاه‌ها و مجموعه‌ها بر اساس تاریخ انتشارپدیدآورانعناوینموضوع‌‌هااین مجموعه بر اساس تاریخ انتشارپدیدآورانعناوینموضوع‌‌ها

    حساب من

    ورود به سامانهثبت نام

    آمار

    مشاهده آمار استفاده

    تازه ترین ها

    تازه ترین مدارک
    © کليه حقوق اين سامانه برای سازمان اسناد و کتابخانه ملی ایران محفوظ است
    تماس با ما | ارسال بازخورد
    قدرت یافته توسطسیناوب