Practical Forensic Imaging: Securing Digital Evidence with Linux Tools

No Starch Press (2016)
  Copy   BIBTEX

Abstract

Forensic image acquisition is an important part of postmortem incident response and evidence collection. Digital forensic investigators acquire, preserve, and manage digital evidence to support civil and criminal cases; examine organizational policy violations; resolve disputes; and analyze cyber attacks. Practical Forensic Imaging takes a detailed look at how to secure and manage digital evidence using Linux-based command line tools. This essential guide walks you through the entire forensic acquisition process and covers a wide range of practical scenarios and situations related to the imaging of storage media. You’ll learn how to: –Perform forensic imaging of magnetic hard disks, SSDs and flash drives, optical discs, magnetic tapes, and legacy technologies –Protect attached evidence media from accidental modification –Manage large forensic image files, storage capacity, image format conversion, compression, splitting, duplication, secure transfer and storage, and secure disposal –Preserve and verify evidence integrity with cryptographic and piecewise hashing, public key signatures, and RFC-3161 timestamping –Work with newer drive and interface technologies like NVME, SATA Express, 4K-native sector drives, SSHDs, SAS, UASP/USB3x, and Thunderbolt –Manage drive security such as ATA passwords; encrypted thumb drives; Opal self-encrypting drives; OS-encrypted drives using BitLocker, FileVault, and TrueCrypt; and others –Acquire usable images from more complex or challenging situations such as RAID systems, virtual machine images, and damaged media With its unique focus on digital forensic acquisition and evidence preservation, Practical Forensic Imaging is a valuable resource for experienced digital forensic investigators wanting to advance their Linux skills and experienced Linux administrators wanting to learn digital forensics. This is a must-have reference for every digital forensics lab.

Other Versions

No versions found

Links

PhilArchive



    Upload a copy of this work     Papers currently archived: 100,809

External links

Setup an account with your affiliations in order to access resources via your University's proxy server

Through your library

Similar books and articles

Digital Forensics.Stefan Meier - 2018 - In Wolff Heintschel von Heinegg, Robert Frau & Tassilo Singer (eds.), Dehumanization of Warfare: Legal Implications of New Weapon Technologies. Springer Verlag. pp. 129-145.
Digital Face Forgery and the Role of Digital Forensics.Manotar Tampubolon - 2024 - International Journal for the Semiotics of Law - Revue Internationale de Sémiotique Juridique 37 (3):753-767.
Disrupted Dwelling: Forensic Aesthetics and the Visibility of Violence.Martin Charvát - 2023 - Espes. The Slovak Journal of Aesthetics 11 (2):69-77.
In defense of forensic social science.Amir Goldberg - 2015 - Big Data and Society 2 (2).
An Exploration of the Ethics of Collecting Forensic Evidence from Sexual Assault Survivors.Leona Bruijns - 2019 - International Journal of Feminist Approaches to Bioethics 12 (1):61-76.

Analytics

Added to PP
2023-09-18

Downloads
2 (#1,893,683)

6 months
2 (#1,686,184)

Historical graph of downloads

Sorry, there are not enough data points to plot this chart.
How can I increase my downloads?

Citations of this work

No citations found.

Add more citations

References found in this work

No references found.

Add more references