Show simple item record

dc.contributor.authorIqbal, Hameed
dc.date.accessioned2010-03-10T10:08:26Z
dc.date.issued2009
dc.identifier.urihttp://hdl.handle.net/11250/143807
dc.description.abstractWith the passage of time, the field of computer forensics is maturing and the traditional methodology of disk forensics has now become a standard. In the same manner volatile data forensics is also getting serious attention from forensic investigators and researchers. Physical memory is an integral part of volatile data forensics. It can provide a forensic examiner with wealth of information like passwords, encrypted keys, typed commands, web addresses, shared and executable files, currently running processes and terminated processes, open ports and active connections. This thesis explores the forensic analysis of physical memory and page file in search of sensitive data using the currently available tools. Experiments are carried out in virtual environment on Windows XP operating system. The immediate purpose of this thesis is to study the impact of increased memory size, operating system and applications on the retention of sensitive data in today’s computers. We will also explore the capabilities and limitations of the currently available tools for the acquisition and analysis of memory and page file.en
dc.format.extent2055994 bytes
dc.format.mimetypeapplication/pdf
dc.language.isoengen
dc.subjectinformasjonssikkerheten
dc.subjectforensic analysisen
dc.subjectphysical memoryen
dc.titleForensic Analysis of Physical Memory and Page Fileen
dc.typeMaster thesisen
dc.subject.nsiVDP::Mathematics and natural science: 400::Information and communication science: 420::Security and vulnerability: 424en


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record