Gaming Consoles And Smart Phones Computer/Digital Forensics

Read Complete Research Material



Gaming consoles and smart phones computer/digital forensics

Introduction

The computer forensics also known as forensic computing, computer forensics, digital forensics or digital forensics examination is the application of scientific techniques and specialized analytical technology infrastructure to identify, preserve, analyze and present data that are valid in a court. These techniques include computer rebuild good, considering residual data, authentication data and explain the technical characteristics of the use applied to the data and information assets. Forensic analysis of systems intended to find out what happened during an instruction that Seeks to answer the questions which normally envelop the whole incident. Who carried out the attack, what information assets were affected and to what extent, when it took place, where it originated and against what targets are addressed, how it was done and why.

Discussion

The Challenge: The Digital Tsunami

In recent years there has been an exponential growth in terms of volume, speed, variety and sophistication of digital activity in the hands of criminals and terrorist groups worldwide. Today, most crimes have a digital component. Some have called digital tsunami. This growth has been exacerbated by the extraordinary advances in electronic hardware. The increasing diversity of consumer electronic devices, all with more memory or storage capacity, offers countless opportunities for criminals and terrorists hide damaging information.

Often, computers and portable hard drives come with a storage capacity equivalent to hundreds of gigabytes. The latest hard drives can be two to four terabytes. Considering that a terabyte can hold the contents of 200 DVDs, we conclude that it is a lot of space and represents an increasing problem that will continue incessantly.

From computers and laptops to mobile phones and miniature flash drives and even game consoles, police and security forces have made every effort to clone, transfer (or create images), index and analyze increasing amounts of data suspects and, at the same time preserve the digital chain of custody and protect citizens.

When a suspect accused and IT assets are confiscated, the police and agencies are under pressure to process and analyze potential evidence in a very short period and in environments that are far from ideal. Also, if the suspected criminal activity or terrorist turns out to be an entire organization, the number of devices to be analyzed too increases dramatically.

Digital Forensic Analysis of Dell ™

Market Challenges

The lack of knowledge and resources, along with the exponential data volume suspects, has delayed work between 18 and 24 months 1). Ad hoc, unstructured approach of computing, infrastructure focused on one or more computers. Expensive time of analysis focused on technology management, data replication and protection of the chain of custody. Access to offsite data is limited. Researchers must work in the laboratory to avoid the risk of information leaks. The malicious code can damage workstations analysts. As a result, it may be necessary to rebuild the system, an action which in turn may result in alteration of the tests.

The data backup methods vary according to the agency suspects. With time, there are risks of malfunctions of the devices / ...
Related Ads