- citati u SCIndeksu: [3]
- citati u CrossRef-u:0
- citati u Google Scholaru:[
]
- posete u poslednjih 30 dana:2
- preuzimanja u poslednjih 30 dana:0
|
|
2012, vol. 17, br. 3, str. 19-33
|
Possibilities of autopsy tool use for forensic purposes
(naslov ne postoji na srpskom)
Sažetak
(ne postoji na srpskom)
The rapid development and widespread use of information technology has brought dramatic changes in all spheres of human activity. At the present time it is difficult to imagine how the world functioned without these technologies. However, despite all the advantages that it brings, information technology has opened various opportunities for misuse. This has caused the development of a new scientific discipline called digital forensics, which deals with the collection, preservation, analysis and presentation of digital evidence. Since digital evidence is very sensitive (easy to delete, modify, etc.), it cannot usually be detected and seen with the classic tools. Therefore, for this purpose, the use of specialized forensic tools is required, that can successfully identify such evidence. There are a number of forensic tools, commercial and non-commercial, which can be found on the market. Some of them are used for each step in the process of digital forensic investigations, and some are multi-functional. When talking about the differences between commercial and non-commercial tools, a frequently asked question is which tools are better, more reliable, faster, more functional, etc. This paper will describe the use of Autopsy, one of the most famous non-commercial forensic tools, and compare its properties with the commercial tool FTK (Forensic Toolkit).
|
|
|
Reference
|
|
Altheide, C., Carvey, H. (2011) Digital forensics with open source tools. Massachusetts: Elsevier
|
|
Brown, L.T. (2010) Computer evidence: Collection and preservation. Boston: Course Technology, Second Edition
|
|
Carvey, H. (2009) Windows forensics analysis. Syngress Publishing, Inc, USA
|
|
Casey, E. (2004) Digital evidence and computer crime. London: Academic Press
|
|
Garrison, C. (2010) Digital forensics for network, internet, and cloud computing a forensic evidence guide for moving target and data. Elsevier
|
3
|
Ignjatović, Đ.M. (1991) Pojmovno određenje kompjuterskog kriminaliteta. Anali Pravnog fakulteta u Beogradu, vol. 39, br. 1-3, str. 136-144
|
3
|
Jones, K., Shema, M., Johnson, B. (2003) Antihakerski alati. Čačak: Kompjuter biblioteka
|
|
Jones, K., Bejtlich, R., Curtis, W., Rose, C. (2005) Real digital forensics. New York: Addison Wesley
|
|
Lazarević, S. (2000) Hakeri. Beograd: Knjiga-komerc
|
2
|
Milosavljević, M., Grubor, G. (2009) Digitalna forenzika računarskog sistema - udžbenik. Beograd: Univerzitet Singidunum
|
3
|
Milosavljević, M., Grubor, G. (2009) Istraga kompjuterskog kriminala - metodološko-tehnološke osnove. Beograd: Univerzitet Singidunum
|
|
Newman, R.C. (2007) Computer forensics - evidence collection and management. Boca Raton: Auerbach Publications
|
|
Petrović, S.P., Ćirić, V.V. (1986) Zaštita podataka u automatizovanim informacionim sistemima. Beograd: Naučna knjiga
|
30
|
Petrović, S.R. (2000) Kompjuterski kriminal. Beograd: Ministarstvo unutrašnjih poslova Republike Srbije
|
1
|
Ranđelović, D., Bogdanović, T. (2010) Alati za digitalnu forenziku. Nauka, bezbednost, policija, vol. 15, br. 2, str. 25-47
|
6
|
Ranđelović, D., Delija, D., Popović, B. (2009) EnCase forenzički alat. Bezbednost, Beograd, vol. 51, br. 1-2, str. 286-312
|
|
Ranđelović, D., Đorđević, V. (2011) Jedan test primer primene IDS otvorenog i zatvorenog koda. Nauka, bezbednost, policija, 16(3): 45-64
|
|
Ruth, A., Hudson, K. (2004) Security +. CET Computer Equipment and Trade
|
1
|
Tanenbaum, E.S. (2005) Računarske mreže. Beograd: Mikro knjiga
|
|
Vacca, R.J. (2005) Computer forensics: Computer crime scene investigation. Massachusetts: Charles River media, second edition
|
|
|
|