Windows 10 instant messaging application forensics
The way netizens communicate with each other deeper with the advent of Instant Messaging applications (IM apps). Thus, its flexibility and quick response on the IM apps has attracted the attentions of cybercriminal operations on the apps such as identity theft and phishing. The forensic investiga...
Saved in:
Main Author: | |
---|---|
Format: | Thesis |
Language: | English |
Published: |
2018
|
Online Access: | http://psasir.upm.edu.my/id/eprint/68922/1/FSKTM%202018%2034%20IR.pdf http://psasir.upm.edu.my/id/eprint/68922/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Universiti Putra Malaysia |
Language: | English |
id |
my.upm.eprints.68922 |
---|---|
record_format |
eprints |
spelling |
my.upm.eprints.689222019-06-26T02:42:01Z http://psasir.upm.edu.my/id/eprint/68922/ Windows 10 instant messaging application forensics Shehu, Aliyu Usman The way netizens communicate with each other deeper with the advent of Instant Messaging applications (IM apps). Thus, its flexibility and quick response on the IM apps has attracted the attentions of cybercriminal operations on the apps such as identity theft and phishing. The forensic investigation of instant messaging apps for the newest Windows 10 OS has been largely uninvestigated. Previous research dealt with dead analysis of the IM apps which did not guaranty accurate result for evidence. But, this research seeks to utilize the four stages of forensic investigation evidence: identification, collection, analysing and reporting. Furthermore, the study figured out data remnants from the top 1% Windows stores application software known as Facebook Instant Messaging apps on Windows 10 OS client machine. The research have focused on the volatile and nonvolatile artefacts with the aid of VM workstation version (VM) 9.0.0 build 812388 running Windows 10 (professional server pack1,64 bit, build 9600) while setting 2GB of physical memory and 20GB of hard disk. The research was be able to detect the kinds of terrestrial artefacts that are obtained after the use of Instant messaging services and software on the contemporary Windows 10 OS. The findings from this research will contribute to the forensic community’s understanding of types of terrestrial artefacts (login details, Installations, friend list, contacts, username, passwords, conversions etc.) which can be used on the establishment of evidence against the suspect on the court of law by forensic examiner. 2018-01 Thesis NonPeerReviewed text en http://psasir.upm.edu.my/id/eprint/68922/1/FSKTM%202018%2034%20IR.pdf Shehu, Aliyu Usman (2018) Windows 10 instant messaging application forensics. Masters thesis, Universiti Putra Malaysia. |
institution |
Universiti Putra Malaysia |
building |
UPM Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Putra Malaysia |
content_source |
UPM Institutional Repository |
url_provider |
http://psasir.upm.edu.my/ |
language |
English |
description |
The way netizens communicate with each other deeper with the advent of Instant Messaging
applications (IM apps). Thus, its flexibility and quick response on the IM apps has attracted the
attentions of cybercriminal operations on the apps such as identity theft and phishing. The forensic
investigation of instant messaging apps for the newest Windows 10 OS has been largely
uninvestigated. Previous research dealt with dead analysis of the IM apps which did not guaranty
accurate result for evidence. But, this research seeks to utilize the four stages of forensic
investigation evidence: identification, collection, analysing and reporting. Furthermore, the study
figured out data remnants from the top 1% Windows stores application software known as
Facebook Instant Messaging apps on Windows 10 OS client machine. The research have focused
on the volatile and nonvolatile artefacts with the aid of VM workstation version (VM) 9.0.0 build
812388 running Windows 10 (professional server pack1,64 bit, build 9600) while setting 2GB of
physical memory and 20GB of hard disk. The research was be able to detect the kinds of terrestrial
artefacts that are obtained after the use of Instant messaging services and software on the contemporary Windows 10 OS. The findings from this research will contribute to the forensic
community’s understanding of types of terrestrial artefacts (login details, Installations, friend list,
contacts, username, passwords, conversions etc.) which can be used on the establishment of
evidence against the suspect on the court of law by forensic examiner. |
format |
Thesis |
author |
Shehu, Aliyu Usman |
spellingShingle |
Shehu, Aliyu Usman Windows 10 instant messaging application forensics |
author_facet |
Shehu, Aliyu Usman |
author_sort |
Shehu, Aliyu Usman |
title |
Windows 10 instant messaging application forensics |
title_short |
Windows 10 instant messaging application forensics |
title_full |
Windows 10 instant messaging application forensics |
title_fullStr |
Windows 10 instant messaging application forensics |
title_full_unstemmed |
Windows 10 instant messaging application forensics |
title_sort |
windows 10 instant messaging application forensics |
publishDate |
2018 |
url |
http://psasir.upm.edu.my/id/eprint/68922/1/FSKTM%202018%2034%20IR.pdf http://psasir.upm.edu.my/id/eprint/68922/ |
_version_ |
1643839345952555008 |