مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Persian Verion

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

video

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

sound

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Persian Version

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View:

851
مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Download:

258
مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Cites:

Information Journal Paper

Title

ANALYZING REGISTRY, LOG FILES, AND PREFETCH FILES IN FINDING DIGITAL EVIDENCE IN GRAPHIC DESIGN APPLICATIONS

Pages

  137-150

Abstract

 The products of GRAPHIC DESIGN APPLICATIONS, leave behind traces of digital information which can be used during a digital forensic investigation in cases where counterfeit documents have been created. This paper analyzes the DIGITAL FORENSICS involved in the creation of counterfeit documents. This is achieved by first recognizing the DIGITAL FORENSIC ARTIFACTS left behind from the use of GRAPHIC DESIGN APPLICATIONS, and then analyzing the files associated with these applications. When analyzing DIGITAL FORENSIC ARTIFACTS generated by an application, the specific focus is on determining whether the graphic design application was installed, whether the application was used, and determining whether an association can be made between the application’s actions and such a digital crime. This is accomplished by locating such information from the registry, log files and prefetch files. The file analysis involves analyzing files associated with these applications for file signatures and metadata. In the end it becomes possible to determine if a system has been used for creating counterfeit documents or not.

Cites

  • No record.
  • References

  • No record.
  • Cite

    APA: Copy

    MABUTO, ENOS K., & VENTER, HEIN S.. (2012). ANALYZING REGISTRY, LOG FILES, AND PREFETCH FILES IN FINDING DIGITAL EVIDENCE IN GRAPHIC DESIGN APPLICATIONS. THE ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 4(2), 137-150. SID. https://sid.ir/paper/241827/en

    Vancouver: Copy

    MABUTO ENOS K., VENTER HEIN S.. ANALYZING REGISTRY, LOG FILES, AND PREFETCH FILES IN FINDING DIGITAL EVIDENCE IN GRAPHIC DESIGN APPLICATIONS. THE ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY[Internet]. 2012;4(2):137-150. Available from: https://sid.ir/paper/241827/en

    IEEE: Copy

    ENOS K. MABUTO, and HEIN S. VENTER, “ANALYZING REGISTRY, LOG FILES, AND PREFETCH FILES IN FINDING DIGITAL EVIDENCE IN GRAPHIC DESIGN APPLICATIONS,” THE ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, vol. 4, no. 2, pp. 137–150, 2012, [Online]. Available: https://sid.ir/paper/241827/en

    Related Journal Papers

    Related Seminar Papers

  • No record.
  • Related Plans

  • No record.
  • Recommended Workshops






    Move to top
    telegram sharing button
    whatsapp sharing button
    linkedin sharing button
    twitter sharing button
    email sharing button
    email sharing button
    email sharing button
    sharethis sharing button