539
views
0
recommends
+1 Recommend
1 collections
    2
    shares
      scite_
       
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      Windows Forensics Analysis

      research-article
      Bookmark

            Abstract

            Computer forensics investigates crimes on digital devices hard disk and any other digital storage devices to determine the evidence of any unauthorized access. Essentially, forensic investigators conduct forensic analysis with the help of different approaches (Static and Dynamic) and also tools like ProDiscover, Encase, Accessdata FTK and Autopsy to guarantee the security of a system in an organization. The process requires knowledge of different registry, laws, and regulations related to computer crimes, the operating system (Windows, Linux, etc.) and the network in an organization (e.g., Win NT). In this paper we will use different forensic tools to extract forensic evidence from a windows environment.

            Content

            Author and article information

            Journal
            10.54878/EJPSS
            Emirati Journal of Policing and Security Studies
            EJPSS
            Emirates Scholar
            20 September 2023
            : 1
            : 1
            : 4-11
            Affiliations
            [1 ]Abu Dhabi Polytechnic, United Arab Erimates
            Author notes
            Correspondence: Mariam Aljouhi ( mariamaljouhi94@ 123456gmail.com )
            Article
            10.54878/EJPSS.179
            0e439335-edd0-4c8c-9c3c-d124079d7c0d
            ©2023Emirates Scholar

            This is an open access article published by Emirates Scholar and distributed under the Creative Commons Attribution License 4.0 (CC BY).

            History

            Social policy & Welfare,International & Comparative law,Criminology,Information systems & theory,Penology & Police science
            Digital Evidence, Forensic Tools., Digital Forensics, Windows Registry, Computer Investigation

            Comments

            Comment on this article