Digital Forensic Report for M57.biz Organization Case
VerifiedAdded on 2023/06/01
|26
|2973
|408
AI Summary
The objective of this project is to create a digital forensic report for the M57.biz organization case. The report covers the methodology, analysis, and findings of the provided forensic image file. The report identifies the leaking design information by using the FTK imager tool. The report also discusses the security issues faced by organizations and the role of digital forensic systems in maintaining data security.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Forensic Computing
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Executive Summary
The main objective of this project is to create the digital forensic report for the provided
case. The m57.biz organization refers to a company of patent search which intends to
researche the patent information for its clients. This organization generally verifies the
novelty of patent for the business of patent searches and for invalidating the a available
patents by determining it priorly. This organization has four employees such as, two patent
researchers, IT administrator and CEO. This firm is planning to hire additional employees at
a later date, once the further clients are booked. The employees of this organization strictly
work onsite and perform the most of the business exchanges through email. Also the
employees work in windows operating system, despite tat their preference varies with
software such as, Thunderbird or outlook. The information of the design is very sensitive and
has great potential value. So, the clients are assigned to only one research staff for one case
and the data copy is not allowed. Moreover, no sharing of contacts is allowed. The contact
and data are strictly forbidden to take data offsite. The information of the pre-patent design is
only on the hard drive of the employee assigned to the clients. Such information’s backup is
performed weekly, by Terry. But, one of the researcher staff (Jo) was leaking the suspicion of
the details for certain patents to the third party organization. So, our cyber security
organization required to identify the leaking design information, by using the forensics tool.
Here, we are using the FTK imager tool to identify the leaking design information. The cyber
security organization was contacted by Mr Pat McGoo, to identifying the concern, where one
of their patent researcher is under suspicion of leaking the design information, for certain
patents to the third party organization. So, the user need to prepare digital forensic report for
this above case and analysis the provided forensic image file.
1
The main objective of this project is to create the digital forensic report for the provided
case. The m57.biz organization refers to a company of patent search which intends to
researche the patent information for its clients. This organization generally verifies the
novelty of patent for the business of patent searches and for invalidating the a available
patents by determining it priorly. This organization has four employees such as, two patent
researchers, IT administrator and CEO. This firm is planning to hire additional employees at
a later date, once the further clients are booked. The employees of this organization strictly
work onsite and perform the most of the business exchanges through email. Also the
employees work in windows operating system, despite tat their preference varies with
software such as, Thunderbird or outlook. The information of the design is very sensitive and
has great potential value. So, the clients are assigned to only one research staff for one case
and the data copy is not allowed. Moreover, no sharing of contacts is allowed. The contact
and data are strictly forbidden to take data offsite. The information of the pre-patent design is
only on the hard drive of the employee assigned to the clients. Such information’s backup is
performed weekly, by Terry. But, one of the researcher staff (Jo) was leaking the suspicion of
the details for certain patents to the third party organization. So, our cyber security
organization required to identify the leaking design information, by using the forensics tool.
Here, we are using the FTK imager tool to identify the leaking design information. The cyber
security organization was contacted by Mr Pat McGoo, to identifying the concern, where one
of their patent researcher is under suspicion of leaking the design information, for certain
patents to the third party organization. So, the user need to prepare digital forensic report for
this above case and analysis the provided forensic image file.
1
Table of Contents
Introduction.........................................................................................................................................3
Methodology Details............................................................................................................................4
Analysis and Findings.........................................................................................................................5
Summary and Conclusion.................................................................................................................23
References..........................................................................................................................................25
2
Introduction.........................................................................................................................................3
Methodology Details............................................................................................................................4
Analysis and Findings.........................................................................................................................5
Summary and Conclusion.................................................................................................................23
References..........................................................................................................................................25
2
Introduction
In this report, the primary objective is to create the digital forensics report for provided
case. The m57.biz organization is a patent search company that, researches the patent
information for their clients. This organization generally verifies the novelty of patent for the
business of patent searches and to invalidate the existing patents by determining it priorly.
This organization has four employees such as, two patent researchers, IT administrator and
CEO. This firm is planning to hire additional employees at a later date, once the further
clients are booked. The employees of this organization strictly work onsite and perform the
most of the business exchanges through email. Also the employees work in windows
operating system, despite tat their preference varies with software such as, Thunderbird or
outlook. The information of the design is very sensitive and has great potential value. So, the
clients are assigned to only one research staff for one case and the data copy is not allowed.
Moreover, no sharing of contacts is allowed. The contact and data are strictly forbidden to
take data offsite. The information of the pre-patent design is only on the hard drive of the
employee assigned to the clients. Such information’s backup is performed weekly, by Terry.
But, one of the researcher staff (Jo) was leaking the suspicion of the details for certain patents
to the third party organization. So, our cyber security organization required to identify the
leaking design information, by using the forensics tool. Here, we are using the FTK imager
tool to identify the leaking design information. The cyber security organization was contacted
by Mr Pat McGoo, to identifying the concern, where one of their patent researcher is under
suspicion of leaking the design information, for certain patents to the third party organization.
Mr. Pat McGoo provides the below information.
Firstly, Jo has become the suspect, so Jo’s work computer was temporarily seized and
the computer hard disk was removed. The forensics image was created by Terry on
December 21st 2009. Jo's subject matter is on PC recreations, there have been no issues with
these licenses until this point. Amusement structure materials would be typical to discover on
the plate. The Wuzbro Toy Company (m57.biz customer and proprietor of toy plans and
licenses) has whined that three ongoing toy structures have had relatively indistinguishable
plans protected by their rivals, Asian Entertainment Corporation. No part of these three plans
must be found on Jo's system and, contingent on the degree of evidence found on Jo's plate,
the accompanying outcomes are conceivable such as, Cautioning and Probation, End of
Employment, Common Lawsuit for Damages and Giving over the case to the nearby police
3
In this report, the primary objective is to create the digital forensics report for provided
case. The m57.biz organization is a patent search company that, researches the patent
information for their clients. This organization generally verifies the novelty of patent for the
business of patent searches and to invalidate the existing patents by determining it priorly.
This organization has four employees such as, two patent researchers, IT administrator and
CEO. This firm is planning to hire additional employees at a later date, once the further
clients are booked. The employees of this organization strictly work onsite and perform the
most of the business exchanges through email. Also the employees work in windows
operating system, despite tat their preference varies with software such as, Thunderbird or
outlook. The information of the design is very sensitive and has great potential value. So, the
clients are assigned to only one research staff for one case and the data copy is not allowed.
Moreover, no sharing of contacts is allowed. The contact and data are strictly forbidden to
take data offsite. The information of the pre-patent design is only on the hard drive of the
employee assigned to the clients. Such information’s backup is performed weekly, by Terry.
But, one of the researcher staff (Jo) was leaking the suspicion of the details for certain patents
to the third party organization. So, our cyber security organization required to identify the
leaking design information, by using the forensics tool. Here, we are using the FTK imager
tool to identify the leaking design information. The cyber security organization was contacted
by Mr Pat McGoo, to identifying the concern, where one of their patent researcher is under
suspicion of leaking the design information, for certain patents to the third party organization.
Mr. Pat McGoo provides the below information.
Firstly, Jo has become the suspect, so Jo’s work computer was temporarily seized and
the computer hard disk was removed. The forensics image was created by Terry on
December 21st 2009. Jo's subject matter is on PC recreations, there have been no issues with
these licenses until this point. Amusement structure materials would be typical to discover on
the plate. The Wuzbro Toy Company (m57.biz customer and proprietor of toy plans and
licenses) has whined that three ongoing toy structures have had relatively indistinguishable
plans protected by their rivals, Asian Entertainment Corporation. No part of these three plans
must be found on Jo's system and, contingent on the degree of evidence found on Jo's plate,
the accompanying outcomes are conceivable such as, Cautioning and Probation, End of
Employment, Common Lawsuit for Damages and Giving over the case to the nearby police
3
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
office for indictment. So, the user need to prepare a digital forensics report for this case and
analyze the provided forensic image file.
Methodology Details
The security of the created and gathered data is considered as the most multi-dimensional
order, in the present day time of data innovation. The organizations and government on the
whole performs the exercises of data security with the help of computerized measurable
frameworks. The advanced measurable frameworks give administration of principles, rules
and best practices, which are created to keep up data security, in any organization. The
obligations and jobs of people, occurred correspondence among these created jobs, duties of
best administration and utilization of data security is likewise characterized by the assistance
of advanced criminological framework. The entire structure of data security inside any
organization is guaranteed by the actualized computerized measurable framework. Along
these lines, the computerized criminological framework is like, administration framework
which is utilized to keep up and set up the anchored condition for any data framework
(Boddington, 2016).
The required methodology and related procedures for compelling administration of data
security are being set up by these computerized 5 criminological frameworks. The essential
point of all and related procedures for the powerful administration of data security built up by
the computerized legal framework are, to give legitimate security to all the data resources of
any organization. This likewise, intends to make constant upgrades in security of any
organization. These worldwide measures give a methodology of hazard administration and
administration control on generally speaking framework by observing, foundation, activities,
execution, enhancements and support of data security in the advanced scientific framework.
The strategies, structure of organization, obligations, exercises of arranging, techniques,
related practices and utilized assets are characterized by these principles for helping
computerized criminological framework. As it is a legal and logical procedure of
examination, thus the Forensic procurement as a piece of computerized measurable
framework requires execution of the following advances:
Procurement: In this progression, the seized procedure for any show is finished. The
confirmation of the obtained picture is finished by making use of MD5 hash
capacities or SHA-1. By utilizing these MD5 hash capacities or SHA-1, the first
4
analyze the provided forensic image file.
Methodology Details
The security of the created and gathered data is considered as the most multi-dimensional
order, in the present day time of data innovation. The organizations and government on the
whole performs the exercises of data security with the help of computerized measurable
frameworks. The advanced measurable frameworks give administration of principles, rules
and best practices, which are created to keep up data security, in any organization. The
obligations and jobs of people, occurred correspondence among these created jobs, duties of
best administration and utilization of data security is likewise characterized by the assistance
of advanced criminological framework. The entire structure of data security inside any
organization is guaranteed by the actualized computerized measurable framework. Along
these lines, the computerized criminological framework is like, administration framework
which is utilized to keep up and set up the anchored condition for any data framework
(Boddington, 2016).
The required methodology and related procedures for compelling administration of data
security are being set up by these computerized 5 criminological frameworks. The essential
point of all and related procedures for the powerful administration of data security built up by
the computerized legal framework are, to give legitimate security to all the data resources of
any organization. This likewise, intends to make constant upgrades in security of any
organization. These worldwide measures give a methodology of hazard administration and
administration control on generally speaking framework by observing, foundation, activities,
execution, enhancements and support of data security in the advanced scientific framework.
The strategies, structure of organization, obligations, exercises of arranging, techniques,
related practices and utilized assets are characterized by these principles for helping
computerized criminological framework. As it is a legal and logical procedure of
examination, thus the Forensic procurement as a piece of computerized measurable
framework requires execution of the following advances:
Procurement: In this progression, the seized procedure for any show is finished. The
confirmation of the obtained picture is finished by making use of MD5 hash
capacities or SHA-1. By utilizing these MD5 hash capacities or SHA-1, the first
4
condition of the gathered proof is again guaranteed, confirmed and is known as
hashing. If there is close down of framework for the criminological examination
which isn't conceivable, at that point, blend of e-revelation forms and advanced
scientific obtaining is being conveyed for finding the confirmations in huge picture
drives. The e-disclosure procedures can likewise make proof gathering for the
computerized scientific through record servers or cloud assets (CYBERCRIME AND
DIGITAL FORENSICS, 2018).
Investigation: While securing process is completed, the proof distinguishing proof via
a created speculation of tempered information is directed. In the following
investigation, the natural systems are pursued that makes the ID of proof hardening
records by making a comprehensive pursuit by filling the document gaps. This
examination uses the quantity of tools dependent on various philosophies for making
recuperation of temper material to start. The tool such as FTK is used here by the
legal inspectors for seeing and recuperating the temper information records. The
examination of these information recuperation typically changes for pictures,
archives, messages and web history or for the visit logs. The recuperation of
information is characterized with the space that is available from the used plate,
erased spaces and the reserve documents of the working system. Catchphrase seeking
is the most ordinarily utilized strategy for proof recuperation from procured picture
records. A particular byte set of picture documents are additionally utilized for
characterizing the start and completion of any investigation process of the advanced
measurable. When the ID process is completed, rebuilding of the deleted information
document starts. The hash marks are the parts which are used by the scientific
analysts via, various tools to contrast the DRS and the deleted documents.
Revealing: Once the examination procedure is completed, the gathered specialized
individuals and the non-specialized confirmations are accounted for the organization,
for the ID of deleted documents and for the occured misfortunes (Pollitt & Shenoi,
2010).
Analysis and Findings
There are such significant number of open source tools accessible in the market, to make
usage of advanced measurable erased documents, where the FTK Imager 3.2.0.0 is one of
5
hashing. If there is close down of framework for the criminological examination
which isn't conceivable, at that point, blend of e-revelation forms and advanced
scientific obtaining is being conveyed for finding the confirmations in huge picture
drives. The e-disclosure procedures can likewise make proof gathering for the
computerized scientific through record servers or cloud assets (CYBERCRIME AND
DIGITAL FORENSICS, 2018).
Investigation: While securing process is completed, the proof distinguishing proof via
a created speculation of tempered information is directed. In the following
investigation, the natural systems are pursued that makes the ID of proof hardening
records by making a comprehensive pursuit by filling the document gaps. This
examination uses the quantity of tools dependent on various philosophies for making
recuperation of temper material to start. The tool such as FTK is used here by the
legal inspectors for seeing and recuperating the temper information records. The
examination of these information recuperation typically changes for pictures,
archives, messages and web history or for the visit logs. The recuperation of
information is characterized with the space that is available from the used plate,
erased spaces and the reserve documents of the working system. Catchphrase seeking
is the most ordinarily utilized strategy for proof recuperation from procured picture
records. A particular byte set of picture documents are additionally utilized for
characterizing the start and completion of any investigation process of the advanced
measurable. When the ID process is completed, rebuilding of the deleted information
document starts. The hash marks are the parts which are used by the scientific
analysts via, various tools to contrast the DRS and the deleted documents.
Revealing: Once the examination procedure is completed, the gathered specialized
individuals and the non-specialized confirmations are accounted for the organization,
for the ID of deleted documents and for the occured misfortunes (Pollitt & Shenoi,
2010).
Analysis and Findings
There are such significant number of open source tools accessible in the market, to make
usage of advanced measurable erased documents, where the FTK Imager 3.2.0.0 is one of
5
them. It is the openly accessible open source application, which can recognize the erased
records and information on a simple basis. The caught screen of FTK Imager 3.2.0.0 is
demonstrated as follows:
Once FTK imager was successfully opened, next add the provided image file, as
demonstrated below. First, choose the case file format and click on the next button (Ray &
Shenoi, 2011).
Later, browse the image file directory and click on the Finish button, as shown below.
6
records and information on a simple basis. The caught screen of FTK Imager 3.2.0.0 is
demonstrated as follows:
Once FTK imager was successfully opened, next add the provided image file, as
demonstrated below. First, choose the case file format and click on the next button (Ray &
Shenoi, 2011).
Later, browse the image file directory and click on the Finish button, as shown below.
6
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Finally, the provided disk image is successfully added, as demonstrated below.
The provided image file results is shown below (Sammons, 2015),
7
The provided image file results is shown below (Sammons, 2015),
7
The provided image file has the below information.
1) Orphan files
2) Root files
3) Unallocated Space files
Orphan files
Orphan files are demonstrated below.
8
1) Orphan files
2) Root files
3) Unallocated Space files
Orphan files
Orphan files are demonstrated below.
8
Root files
The root files are demonstrated below.
The root file has 56 deleted files, as demonstrated below.
9
The root files are demonstrated below.
The root file has 56 deleted files, as demonstrated below.
9
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Unallocated files
The unallocated files are demonstrated below.
Export the files
10
The unallocated files are demonstrated below.
Export the files
10
To export the file, right click on the deleted files, to choose to export the file and
select the folder to save the deleted file. Here, we export the backup file as demonstrated
below.
Right click on the backup file, to choose the export file as it is represented in the below
screenshot.
Then, select the folder for saving the deleted file, as it is represented in the below screenshot.
At last, the deleted file is exported successfully as it is demonstrated below.
11
select the folder to save the deleted file. Here, we export the backup file as demonstrated
below.
Right click on the backup file, to choose the export file as it is represented in the below
screenshot.
Then, select the folder for saving the deleted file, as it is represented in the below screenshot.
At last, the deleted file is exported successfully as it is demonstrated below.
11
Jo Folder
The provided case file has Jo folder on the root file. It is shown below.
12
The provided case file has Jo folder on the root file. It is shown below.
12
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Patent Information are demonstrated in the below image.
13
13
14
15
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Hidden Files
The identified hidden images, videos and audios are demonstrated in the below image.
16
The identified hidden images, videos and audios are demonstrated in the below image.
16
Identified text files are shown below.
Patent terms files
It is shown below.
17
Patent terms files
It is shown below.
17
Identified Patent URLs are shown below.
18
18
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
It is demonstrated below.
19
19
Jo clients Details
Jo client’s Details are demonstrated in the below image.
20
Jo client’s Details are demonstrated in the below image.
20
21
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
The given case file has 3,753,177 files and the file system version is Windows XP. It
has Jo folder, which contains a lot of deleted files that are recovered successfully. Jo folder
comprises of, a lot of image files, audio files, text files, pdf files and much more. All these
are based on the patent information, which are successfully recovered by using the FTK
imager.
All the above mentioned information are successfully recovered by using FTK
imager. The combination of data frameworks inside any organization faces some security
issues. These issues may influence the information engineering of any organization, which
can keep the organization to perform the ordinary executions that are desirable. The advanced
legal pretends 52 for locating every single record that is deleted and the other issues related to
security of the information hardening. The focus to represent the fundamental finding of the
computerized legal in any of the organization are recorded below:
The selected innovation for the data framework incorporation could cause the
information to break on the imaging: while in any organization the data
framework’s reconciliation occurs, the organization requires hand-off on the
off-the-rack application that could be adjustable, effortlessly. Such
applications make a suite to adequately deal with the organization’s database.
The required information could be retrieved by the end client depending on
the necessities. In any case, the shot of information leakage is conceivable
with the similar off-the-rack applications.
22
has Jo folder, which contains a lot of deleted files that are recovered successfully. Jo folder
comprises of, a lot of image files, audio files, text files, pdf files and much more. All these
are based on the patent information, which are successfully recovered by using the FTK
imager.
All the above mentioned information are successfully recovered by using FTK
imager. The combination of data frameworks inside any organization faces some security
issues. These issues may influence the information engineering of any organization, which
can keep the organization to perform the ordinary executions that are desirable. The advanced
legal pretends 52 for locating every single record that is deleted and the other issues related to
security of the information hardening. The focus to represent the fundamental finding of the
computerized legal in any of the organization are recorded below:
The selected innovation for the data framework incorporation could cause the
information to break on the imaging: while in any organization the data
framework’s reconciliation occurs, the organization requires hand-off on the
off-the-rack application that could be adjustable, effortlessly. Such
applications make a suite to adequately deal with the organization’s database.
The required information could be retrieved by the end client depending on
the necessities. In any case, the shot of information leakage is conceivable
with the similar off-the-rack applications.
22
The shared information between the data framework could result in security
problems for the computerized criminological inspectors. The information is
shared between the coordination organizations with the assistance of the
created information structures of imaging. To defeat similar problems, the
right security with the firewalls and antivirus should be linked on the shared
information between the incorporated frameworks. If any such problem
occurs, the computerized criminological could be used for defeating it.
Joining with the external process could result in security problems: The
information treats from the external clients, if there must arise any
occurrence of inclusion of the external process contribution in the
coordination of data framework, for any organization could result in security
problems. The usage of the secluded application suite for the reconciliation
of the in-house and external data framework in coordination could result in
security problems for the organizations. Such problems are recognized by
using the access rights, stockpiling of information, by sharing the information
between the in-house and the external process, file information of
organization and by controlling the information that is shared.
Summary and Conclusion
The given case file has 3,753,177 files and the file system’s version is Windows XP. It
has Jo folder, which contains a lot of deleted files that are recovered successfully. Jo folder
comprises of, a lot of image files, audio files, text files, pdf files and much more. All these
are based on the patent information, which are successfully recovered by using the FTK
imager.
This project is created successfully with a digital forensics report for the provided case
and the provided forensics image files are analyzed. The provided case information has the
following details. The m57.biz organization is a patent search company that researches the
patent information for their clients. This organization generally verifies the novelty of the
patent, for the business of patent searches, and to invalidate an existing patent by determining
the prior art. The employees of this organization strictly work onsite and perform the most of
the business exchanges through email. Also the employees work in windows operating
system, despite tat their preference varies with software such as, Thunderbird or outlook. The
information of the design is very sensitive and has great potential value. So, the clients are
23
problems for the computerized criminological inspectors. The information is
shared between the coordination organizations with the assistance of the
created information structures of imaging. To defeat similar problems, the
right security with the firewalls and antivirus should be linked on the shared
information between the incorporated frameworks. If any such problem
occurs, the computerized criminological could be used for defeating it.
Joining with the external process could result in security problems: The
information treats from the external clients, if there must arise any
occurrence of inclusion of the external process contribution in the
coordination of data framework, for any organization could result in security
problems. The usage of the secluded application suite for the reconciliation
of the in-house and external data framework in coordination could result in
security problems for the organizations. Such problems are recognized by
using the access rights, stockpiling of information, by sharing the information
between the in-house and the external process, file information of
organization and by controlling the information that is shared.
Summary and Conclusion
The given case file has 3,753,177 files and the file system’s version is Windows XP. It
has Jo folder, which contains a lot of deleted files that are recovered successfully. Jo folder
comprises of, a lot of image files, audio files, text files, pdf files and much more. All these
are based on the patent information, which are successfully recovered by using the FTK
imager.
This project is created successfully with a digital forensics report for the provided case
and the provided forensics image files are analyzed. The provided case information has the
following details. The m57.biz organization is a patent search company that researches the
patent information for their clients. This organization generally verifies the novelty of the
patent, for the business of patent searches, and to invalidate an existing patent by determining
the prior art. The employees of this organization strictly work onsite and perform the most of
the business exchanges through email. Also the employees work in windows operating
system, despite tat their preference varies with software such as, Thunderbird or outlook. The
information of the design is very sensitive and has great potential value. So, the clients are
23
assigned to only one research staff for one case and the data copy is not allowed. Moreover,
no sharing of contacts is allowed. The contact and data are strictly forbidden to take data
offsite. The information of the pre-patent design is only on the hard drive of the employee
assigned to the clients. Such information’s backup is performed weekly, by Terry. But, one of
the researcher staff (Jo) was leaking the suspicion of the details for certain patents to the third
party organization. So, our cyber security organization successfully identified the leaking
design information, by using the forensics tool. Here, we used FTK imager tool to identify
the leaking design information.
24
no sharing of contacts is allowed. The contact and data are strictly forbidden to take data
offsite. The information of the pre-patent design is only on the hard drive of the employee
assigned to the clients. Such information’s backup is performed weekly, by Terry. But, one of
the researcher staff (Jo) was leaking the suspicion of the details for certain patents to the third
party organization. So, our cyber security organization successfully identified the leaking
design information, by using the forensics tool. Here, we used FTK imager tool to identify
the leaking design information.
24
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
References
Boddington, R. (2016). Practical Digital Forensics. Packt Publishing.
CLANRYE INTL. (2018). CYBERCRIME AND DIGITAL FORENSICS. [S.l.].
Pollitt, M., & Shenoi, S. (2010). Advances in digital forensics. New York:
Springer/International Federation for Information Processing.
Ray, I., & Shenoi, S. (2011). Advances in digital forensics IV. New York: Springer.
Sammons, J. (2015). The basics of digital forensics. Amsterdam: Syngress Media.
25
Boddington, R. (2016). Practical Digital Forensics. Packt Publishing.
CLANRYE INTL. (2018). CYBERCRIME AND DIGITAL FORENSICS. [S.l.].
Pollitt, M., & Shenoi, S. (2010). Advances in digital forensics. New York:
Springer/International Federation for Information Processing.
Ray, I., & Shenoi, S. (2011). Advances in digital forensics IV. New York: Springer.
Sammons, J. (2015). The basics of digital forensics. Amsterdam: Syngress Media.
25
1 out of 26
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.