Centro de Documentação da PJ | ||||
| CORBIN, George The Google Chrome operating system forensic artifacts [Documento electrónico] / George Corbin.- Utica, NY : [s.n.], 2014.- 1 CD-ROM ; 12 cm Tese para obtenção do grau de "Master of Science in Cybersecurity" apresentada no "Faculty of Utica College". Ficheiro de 5,62 MB (69 p.). Também disponível através de: http://pqdtopen.proquest.com/doc/1647758209.html?FMT=AI. Acedido a 4 de Fevereiro de 2015. SEGURANÇA INFORMÁTICA, CRIME INFORMÁTICO, SISTEMA OPERATIVO, RECOLHA DA PROVA, INFORMÁTICA FORENSE, SOFTWARE, EQUIPAMENTO INFORMÁTICO, TESE List of Illustrative Materials. The Google Chrome Operating System Forensic Artifacts. The Relevance of Google Chrome Operating System Artifacts. Literature Review. Methodology. Setup. Hardware. ZTC 2-in-1 Thunder Board M.2 (NGFF) Board Adapter. Patuoxun USB 2.0 to SATA Converter Adapter Cable. Acer c720 Chromebook. Dell Inspiron 15 7000 Series Model 7537 Touchscreen. Software Microsoft Word Professional 2010. VMWare Workstation 10.0.3 – build 1895310. Microsoft Windows XP Professional SP 3. Google Chrome browser version 38.0.2125.111 m. Google Chrome Operating System v38. AccessData FTK Imager 3.1.0.1514. AccessData Forensic Toolkit 1.81.6. ChromeAnalysis Plus 1.4.1 Trial for Windows. Google Gmail Account. Evaluation Foundation. Analysis. Commence. Preparation. Evidence Source Identification and Preservation. Collection. Examination and Analysis. Artifacts of Google Chrome Operating System from SSD Image Capture. Artifacts of Google Chrome Browser in Windows XP VM While Logged In. Artifacts of Google Chrome Operating System in Developer Mode. Crosh Tools Available in Shell. Crosh Running Ubuntu Unity Release. Using Linux Tools on Chrome Operating System for Forensic Toolkits. Logical Copy of Chromebook User Directory and Analysis Using FTK. Discussion of Findings. Future Research Recommendatios. Google Chromebook Forensic Tools Run from a USB Flash drive. Establish a Legal Relationship with Google. Chromebook Browser Artifact Extraction in Mainstream Tools. Conclusion. References. |