[eside-ghost] [Fwd: Ipod's Forensics]
txipi en sindominio.net
txipi en sindominio.net
Jue Ene 26 09:53:10 CET 2006
---------------------------- Mensaje original ----------------------------
Asunto: Ipod's Forensics
De: Jeimy José Cano Martínez <jcano en uniandes.edu.co>
Fecha: Mie, 25 de Enero de 2006, 9:58 pm
Para: segurinfo en acis.org.co
Cc: forensics-es en securityfocus.com
alfa-redi en dgroups.org
--------------------------------------------------------------------------
Estimados profesionales,
Adjunto enlace a reciente artículo publicado en el International Journal
of Digital Evidence, donde se detallan algunas ideas y estrategias para
adelantar procedimientos forenses sobre IPODS.
Espero sea de su interés.
http://www.ijde.org/docs/05-fall-MarsicoRogers.pdf
iPod Forensics
Christopher V. Marsico
Marcus K. Rogers
Purdue University Cyber Forensics Lab
Department of Computer Technology
Purdue University
Abstract
The iPod is one of the most popular digital music devices in today’s
marketplace. The newest versions of the iPod have become more PDA/storage
like than ever before. With this new functionality the iPod has recently
found its way into the criminal world. With the continued growth of the
digital music device market, the iPod’s use in criminal activity will only
continue to increase. This paper discusses some of the features of the
iPod and how a criminal could use them. A literature review found little
or no
documentation or discussion on the forensic analysis of the iPod or
similar devices. Therefore, this research outlines what should be
considered when an iPod is found at the crime scene, and offers a critical
analysis of some common forensic tools and their ability to collect and
analyze data from an iPod. Suggestions for future research are also
provided.
Jeimy J. Cano, Ph.D, CFE
Universidad de los Andes
Bogota, D.C
COLOMBIA
Editor of "Critical Reflections on Information Systems. A systemic
approach" http://www.idea-group.com/books/details.asp?id=507
--------------------------------------------------------------------------------
Este correo y su contenido son confidenciales y exclusivos para su
destinatario. Si usted recibe este mensaje por error o no es el
destinatario del mismo, por favor sírvase eliminarlo y notificarle a su
originador. Así mismo, todas las ideas y reflexiones expresadas en esta
comunicación corresponden al originador del correo y NO representa la
posición oficial de su empleador.
--------------------------------------------------------------------------------
This email is intended only for the addressee(s) and contains information
which may be confidential, legally privileged. If you are not intended
recipient please do not save, forward, disclose or copy the content of
this email. Please delete it completely from your system and notify
originator.Finally, all ideas expressed in this communication are personal
comments and NOT represent official position of his employer.
--------------------------------------------------------------------------------
--
Agur
txipi
Más información sobre la lista de distribución eside-ghost