Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 6 of 6

Full-Text Articles in Entire DC Network

Exploring Myths In Digital Forensics: Separating Science From Ritual, Gary C. Kessler, Gregory H. Carlton Jan 2017

Exploring Myths In Digital Forensics: Separating Science From Ritual, Gary C. Kessler, Gregory H. Carlton

Publications

Digital forensic methodology deviates significantly relative to the methods of other forensic sciences for numerous practical reasons, and it has been largely influenced by factors derived from the inception and evolution of this relatively new and rapidly changing field. Digital forensics methodology was developed more by practitioners in its early days rather than by computer scientists. This led to accepted best practices in the field that may not represent the best or, at least, tested, science. This paper explores some of these differences in the practice and evolution between digital and other forensic sciences, and recommends scientific approaches to apply …


Identifying Trace Evidence From Target-Specific Data Wiping Application Software, Gregory H. Carlton, Gary C. Kessler Jan 2012

Identifying Trace Evidence From Target-Specific Data Wiping Application Software, Gregory H. Carlton, Gary C. Kessler

Security Studies & International Affairs - Daytona Beach

"One area of particular concern for computer forensics examiners involves situations in which someone utilized software applications to destroy evidence. There are products available in the marketplace that are relatively inexpensive and advertised as being able to destroy targeted portions of data stored within a computer system. This study was undertaken to analyze a subset of these tools in order to identify trace evidence, if any, left behind on disk media after executing these applications. We evaluated five Windows 7 compatible software products whose advertised features include the ability for users to wipe targeted files, folders, or evidence of selected …


Book Review: Digital Forensic Evidence Examination, Gary C. Kessler Jan 2010

Book Review: Digital Forensic Evidence Examination, Gary C. Kessler

Publications

This document is Dr. Kessler's review of the second edition of Digital Forensic Evidence Examination by Fred Cohen. ASP Press, 2010. ISBN: 978-1-878109-45-3


Book Review: Mac Os X, Ipod, And Iphone Forensic Analysis Dvd Toolkit, Gary C. Kessler Jan 2008

Book Review: Mac Os X, Ipod, And Iphone Forensic Analysis Dvd Toolkit, Gary C. Kessler

Publications

This document is Dr. Kessler's review of MAC OS X, iPod, and iPhone Forensic Analysis DVD Toolkit, edited by Jesse Varsalone. Syngress, 2009. ISBN: 978-1-59749-297-3.


Book Review: Challenges To Digital Forensic Evidence, Gary C. Kessler Jan 2008

Book Review: Challenges To Digital Forensic Evidence, Gary C. Kessler

Publications

This document is Dr. Kessler's review of Challenges to Digital Forensic Evidence, by Fred Cohen. Fred Cohen & Associates, 2008. ISBN 1-878109-41-3


Computer Forensics: The Issues And Current Books In The Field, Gary C. Kessler, Michael Schirling Jan 2002

Computer Forensics: The Issues And Current Books In The Field, Gary C. Kessler, Michael Schirling

Publications

Computer crime investigation is a multidisciplinary profession and almost no one today has been trained purely as a computer forensic analyst. Toward that end, investigators need professional reference guides and texts that cover the major points of computer forensics. In this article, we discuss some broad issues related to forensic computing and include a review of four texts on the subject:

  • Computer Forensics: Incident Response Essentials, Warren G. Kruse II & Jay G. Heiser
  • Computer Forensics & Privacy, Michael Caloyannides
  • Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes, edited by Albert J. …