EconPapers    
Economics at your fingertips  
 

Impact of Tools on the Acquisition of RAM Memory

Marcos Fuentes Martínez
Additional contact information
Marcos Fuentes Martínez: Guardia Civil, Spain

International Journal of Cyber Forensics and Advanced Threat Investigations, 2020, vol. 1, issue 1-3, 3-17

Abstract: When responding to a security incident in a system, several basic principles must be followed regarding the collection of pieces of evidence from the system. The capture of these pieces of evidence has to be done according to its order of volatility. In this sense, RAM memory constitute the most important element to capture, given its extreme volatility. RAM memory must be acquired and analyzed because the data it holds, which may belong to the system itself or to any other device connected to it, can survive a certain amount of time in it. Since RAM is a constantly changing element, it must be stood out that any action carried on the system under analysis will modify the contents of the RAM. In this article a comparative and an objective analysis has been carried out, showing the impact that the execution of some tools for the capture of RAM has on the system. This comparative study details both the private shared workspaces, for each of the processes executed by each of the tools used.

Keywords: DFIR; Digital Forensics; Incident Response; RAM Memory; Windows; Impact of tools (search for similar items in EconPapers)
Date: 2020
References: Add references at CitEc
Citations:

Downloads: (external link)
https://conceptechint.net/index.php/CFATI/article/download/12/2 (application/pdf)
https://conceptechint.net/index.php/CFATI/article/view/12 (text/html)

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:aox:rcfati:v:1:y:2020:i:1-3:p:3-17

DOI: 10.46386/ijcfati.v1i1-3.12

Access Statistics for this article

International Journal of Cyber Forensics and Advanced Threat Investigations is currently edited by Professor John William Walker

More articles in International Journal of Cyber Forensics and Advanced Threat Investigations from Concept Tech Publishing
Bibliographic data for series maintained by Mira Leonko ().

 
Page updated 2025-03-19
Handle: RePEc:aox:rcfati:v:1:y:2020:i:1-3:p:3-17