Epidemics: The Rise Of Anti-Forensics

1723 Words7 Pages

Student Name: Keshab Rawal Student ID: 77171807 Word Count: Title: The rise of anti-forensics: The rise of anti-forensics: Tables of contents: • Overview • Introduction • History • Categories/Tools of anti-forensics • Conclusion • Future Work Overview: Computer forensics is an active topic of research, with areas of study including wireless forensics, network security and cyber investigations. The goal of the computer forensics is to provide information about how the crime happened, why and who is involved in the crime in any legal proceeding by using the computer forensic tools. Data Destruction – Destroy any evidence before someone gets a chance to find it E.g. Disk wiping, wipe, srm, evidence eliminator, necrofile . Data Misdirection …show more content…

Within this field of study, numerous definitions of anti-forensics abound. One of the more widely known and accepted definitions comes from Dr. Marc Rogers of Purdue University. Dr. Rogers uses a more traditional “crime scene” approach when defining anti-forensics. “Attempts to negatively affect the existence, amount and/or quality of evidence from a crime scene, or make the analysis and examination of evidence difficult or impossible to conduct.”[1] A more abbreviated definition is given by Scott Berinato in his article entitled, The Rise of Anti-Forensics. “Anti-forensics is more than technology. It is an approach to criminal hacking that can be summed up like this: Make it hard for them to find you and impossible for them to prove they found you.”[2] Neither author takes into account using anti-forensics methods to ensure the privacy of one's personal …show more content…

The main focus of this project was to provide a means of education to digital forensic investigations to develop better and efficient tools to overcome the anti forensic packages. The future of this project could be extended to implement many other anti forensic techniques and features like encryption, steganography and even targeting computer forensic tool vulnerabilities. It would be a disaster if all these techniques are combined and implemented. The future developments could also make use of other digital forensic tools like Prodiscover, Encase and also new computer forensic tools being developed currently in the industry. Defeating cross view rootkit detection tools in a generic