Windows 10 instant messaging application forensics
The way netizens communicate with each other deeper with the advent of Instant Messaging applications (IM apps). Thus, its flexibility and quick response on the IM apps has attracted the attentions of cybercriminal operations on the apps such as identity theft and phishing. The forensic investigatio...
Zapisane w:
| 1. autor: | |
|---|---|
| Format: | Thesis |
| Język: | English |
| Wydane: |
2018
|
| Dostęp online: | http://ethesis.upm.edu.my/id/eprint/11038/1/FSKTM%202018%2034%20T.pdf |
| Etykiety: |
Dodaj etykietę
Nie ma etykietki, Dołącz pierwszą etykiete!
|
| id |
oai:ethesis.upm.edu.my:11038 |
|---|---|
| record_format |
eprints |
| spelling |
oai:ethesis.upm.edu.my:11038 http://ethesis.upm.edu.my/id/eprint/11038/ Windows 10 instant messaging application forensics Shehu, Aliyu Usman The way netizens communicate with each other deeper with the advent of Instant Messaging applications (IM apps). Thus, its flexibility and quick response on the IM apps has attracted the attentions of cybercriminal operations on the apps such as identity theft and phishing. The forensic investigation of instant messaging apps for the newest Windows 10 OS has been largely uninvestigated. Previous research dealt with dead analysis of the IM apps which did not guaranty accurate result for evidence. But, this research seeks to utilize the four stages of forensic investigation evidence: identification, collection, analysing and reporting. Furthermore, the study figured out data remnants from the top 1% Windows stores application software known as Facebook Instant Messaging apps on Windows 10 OS client machine. The research have focused on the volatile and nonvolatile artefacts with the aid of VM workstation version (VM) 9.0.0 build 812388 running Windows 10 (professional server pack1,64 bit, build 9600) while setting 2GB of physical memory and 20GB of hard disk. The research was be able to detect the kinds of terrestrial artefacts that are obtained after the use of Instant messaging services and software on the contemporary Windows 10 OS. The findings from this research will contribute to the forensic community’s understanding of types of terrestrial artefacts (login details, Installations, friend list, contacts, username, passwords, conversions etc.) which can be used on the establishment of evidence against the suspect on the court of law by forensic examiner. 2018-01 Thesis NonPeerReviewed application/pdf en http://ethesis.upm.edu.my/id/eprint/11038/1/FSKTM%202018%2034%20T.pdf Shehu, Aliyu Usman (2018) Windows 10 instant messaging application forensics. Masters thesis, Universiti Putra Malaysia. (FSKTM 2018 34). |
| institution |
UPM eTHESES |
| collection |
UPM eTHESES |
| language |
English |
| description |
The way netizens communicate with each other deeper with the advent of Instant Messaging applications (IM apps). Thus, its flexibility and quick response on the IM apps has attracted the attentions of cybercriminal operations on the apps such as identity theft and phishing. The forensic investigation of instant messaging apps for the newest Windows 10 OS has been largely uninvestigated. Previous research dealt with dead analysis of the IM apps which did not guaranty accurate result for evidence. But, this research seeks to utilize the four stages of forensic investigation evidence: identification, collection, analysing and reporting. Furthermore, the study figured out data remnants from the top 1% Windows stores application software known as Facebook Instant Messaging apps on Windows 10 OS client machine. The research have focused on the volatile and nonvolatile artefacts with the aid of VM workstation version (VM) 9.0.0 build 812388 running Windows 10 (professional server pack1,64 bit, build 9600) while setting 2GB of physical memory and 20GB of hard disk. The research was be able to detect the kinds of terrestrial artefacts that are obtained after the use of Instant messaging services and software on the contemporary Windows 10 OS. The findings from this research will contribute to the forensic community’s understanding of types of terrestrial artefacts (login details, Installations, friend list, contacts, username, passwords, conversions etc.) which can be used on the establishment of evidence against the suspect on the court of law by forensic examiner. |
| format |
Thesis |
| author |
Shehu, Aliyu Usman |
| spellingShingle |
Shehu, Aliyu Usman Windows 10 instant messaging application forensics |
| author_facet |
Shehu, Aliyu Usman |
| author_sort |
Shehu, Aliyu Usman |
| title |
Windows 10 instant messaging application forensics |
| title_short |
Windows 10 instant messaging application forensics |
| title_full |
Windows 10 instant messaging application forensics |
| title_fullStr |
Windows 10 instant messaging application forensics |
| title_full_unstemmed |
Windows 10 instant messaging application forensics |
| title_sort |
windows 10 instant messaging application forensics |
| publishDate |
2018 |
| url |
http://ethesis.upm.edu.my/id/eprint/11038/1/FSKTM%202018%2034%20T.pdf |
| _version_ |
1819311163221999616 |
| score |
13.4562235 |
