티스토리 뷰
오래된 자료임에도 아주 유용하네요. 범죄유형별로 포렌식 분석할 대상들입니다. 분석기법개발에 도움이 많이 되겠네요.
https://www.ncjrs.gov/pdffiles1/nij/187736.pdf
예시)
Computer Intrusion
u Address books.
u Configuration files.
u E-mail/notes/letters.
u Executable programs.
u Internet activity logs.
u Internet protocol (IP) address and user name.
u Internet relay chat (IRC) logs.
u Source code.
u Text files (user names and passwords).
Death Investigation
u Address books.
u Diaries.
u E-mail/notes/letters.
u Financial/asset records.
u Images.
u Internet activity logs.
u Legal documents and wills.
u Medical records.
u Telephone records.
Domestic Violence
u Address books.
u Diaries.
u E-mail/notes/letters.
u Financial/asset records.
u Medical records.
u Telephone records.
'Forensic TIPs' 카테고리의 다른 글
core file systems and artifacts (0) | 2018.07.20 |
---|---|
2017 Data Breach Investigations Report (0) | 2017.05.22 |
Control Panel Forensics: Evidence of Time Manipulation and More (0) | 2015.07.29 |
스마트폰 포렌식 포스터 (0) | 2014.07.24 |
LIVE Response vs. Traditional Forensics (0) | 2014.07.21 |
댓글