Computer Security, Forensics and Ethical Hacking
This unit explained memory forensics and the method used in extracting information from the volatile memory. It is necessary to acquire information from different parts of the system when a system has been the target of crime or the system is used for storing information which is part of the crime. In either case, the suspect would have stored the information in the memory using memory injection or by other means. This unit provides method of hardware data acquisition and software data acquisition to acquire the above information for investigation purpose.