Attacks Against Computer Forensics
In the past anti-forensic tools have focused on attacking the forensic process by destroying data, hiding data, or altering data usage information. Anti-forensics has recently moved into a new realm where tools and techniques are focused on attacking forensic tools that perform the examinations. These new anti-forensic methods have benefited from a number of factors to include well documented forensic examination procedures, widely known forensic tool vulnerabilities and digital forensic examiners heavy reliance on their tools.
During a typical forensic examination, the examiner would create an image of the computer's disks. This keeps the original computer (evidence) from being tainted by forensic tools. Hashes are created by the forensic examination software to verify the integrity of the image. One of the recent anti-tool techniques targets the integrity of the hash that is created to verify the image. By affecting the integrity of the hash, any evidence that is collected during the subsequent investigation can be challenged.
Read more about this topic: Anti-computer Forensics
Famous quotes containing the words attacks and/or computer:
“There exists, at the bottom of all abasement and misfortune, a last extreme which rebels and joins battle with the forces of law and respectability in a desperate struggle, waged partly by cunning and partly by violence, at once sick and ferocious, in which it attacks the prevailing social order with the pin-pricks of vice and the hammer-blows of crime.”
—Victor Hugo (18021885)
“The archetype of all humans, their ideal image, is the computer, once it has liberated itself from its creator, man. The computer is the essence of the human being. In the computer, man reaches his completion.”
—Friedrich Dürrenmatt (19211990)