SSD Forensic Investigation Using Open Source Tool

SSD Forensic Investigation Using Open Source Tool

Copyright: © 2023 |Pages: 23
ISBN13: 9781668468647|ISBN10: 1668468646|ISBN13 Softcover: 9798369304396|EISBN13: 9781668468654
DOI: 10.4018/978-1-6684-6864-7.ch003
Cite Chapter Cite Chapter

MLA

Suthar, Hepi, and Priyanka Sharma. "SSD Forensic Investigation Using Open Source Tool." Examining Multimedia Forensics and Content Integrity, edited by Sumit Kumar Mahana, et al., IGI Global, 2023, pp. 56-78. https://doi.org/10.4018/978-1-6684-6864-7.ch003

APA

Suthar, H. & Sharma, P. (2023). SSD Forensic Investigation Using Open Source Tool. In S. Mahana, R. Aggarwal, & S. Singh (Eds.), Examining Multimedia Forensics and Content Integrity (pp. 56-78). IGI Global. https://doi.org/10.4018/978-1-6684-6864-7.ch003

Chicago

Suthar, Hepi, and Priyanka Sharma. "SSD Forensic Investigation Using Open Source Tool." In Examining Multimedia Forensics and Content Integrity, edited by Sumit Kumar Mahana, Rajesh Kumar Aggarwal, and Surjit Singh, 56-78. Hershey, PA: IGI Global, 2023. https://doi.org/10.4018/978-1-6684-6864-7.ch003

Export Reference

Mendeley
Favorite

Abstract

According to the CIA triad, Cyber Forensic Investigation judicial point of view is the data integrity of volatile memory kinds of data storage devices. This has long been a source of concern, and it is critical for the chain of custody procedure. As an outcome result, it is a substantial advancement for the measured examination cycle to safeguard unstable data from SSD. In this study provides the easiest way to preserve potentially volatile based memory digital proof, store on SSDs, and generate forensically bit-streams, also known as bit-by-bit copies. The challenge of protecting the data integrity of an electronic piece of evidence that has been arrested at a crime scene frequently faces analysts. This academic article primarily suggests a process method and a few steps for carrying out forensic investigations on data obtained from solid state drives all the while avoiding the TRIM characteristic and garbage series from running lacking user input or interaction, preserving the data integrity of the facts as usable digital evidence.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.