Computer forensics-digitized science

In today's era `Digital' is a house hold name. As some way or the other technology is part of our lives. Digital media can be seen as the live example of the same. Digitization is in the air. It is peeping in our lives up to so much of extent that even if anything goes wrong we can rebuild the scene and investigate, what went wrong. While investigation we have to check, whether the crime has taken place through some digital media or crime has taken place and now digital media is used to build up the scene of crime and evidences. In this paper, we have discussed the computer forensics life cycle and a very much capable tool to investigate the digital media-Hex Editor.

[1]  James Tetteh Ami-Narh,et al.  Digital forensics and the legal system: A dilemma of our times , 2008 .

[2]  Matthew Geiger,et al.  Evaluating Commercial Counter-Forensic Tools , 2005, DFRWS.

[3]  Bret Dunbar,et al.  A detailed look at Steganographic Techniques and their use in an Open-Systems Environment , 2002 .

[4]  Paresh Kerai Remote Access Forensics for Vnc and Rdp on Windows Platform , 2012 .

[5]  Valerie Hobbs,et al.  The Advanced Data Acquisition Model (ADAM): A Process Model for Digital Forensic Practice , 2013, J. Digit. Forensics Secur. Law.

[6]  Simson L. Garfinkel,et al.  Forensic feature extraction and cross-drive analysis , 2006, Digit. Investig..

[7]  Krishnun Sansurooah A forensics overview and analysis of USB flash memory devices , 2009 .

[8]  Venansius Baryamureeba,et al.  The Enhanced Digital Investigation Process Model , 2004 .

[9]  Eoghan Casey,et al.  Handbook of Digital Forensics and Investigation , 2009 .

[10]  Lawrence A. Presley,et al.  Recovering and Examining Computer Forensic Evidence , 2000 .

[11]  Nicole Beebe,et al.  A hierarchical, objectives-based framework for the digital investigations process , 2005, Digit. Investig..

[12]  Eugene H. Spafford,et al.  Getting Physical with the Digital Investigation Process , 2003, Int. J. Digit. EVid..

[13]  SangJin Lee,et al.  Data hiding in windows executable files , 2008 .

[14]  Gregg H. Gunsch,et al.  An Examination of Digital Forensic Models , 2002, Int. J. Digit. EVid..