Forensic Analysis of Digsby Log Data to Trace Suspected User Activities
M Yasin, M Abulaish, MNN Elmogy - … and Data Management: ITCS 2012 & …, 2012 - Springer
M Yasin, M Abulaish, MNN Elmogy
Information Technology Convergence, Secure and Trust Computing, and Data …, 2012•SpringerDigsby is a versatile nature application, which can be used for instant messaging, emailing
and at the same time providing an opportunity to end users to communicate over online
social networks. Due to providing versatile services and facilities, the usage of Digsby by
end users has diverted the attention of intelligence agencies to look into its log data from
digital forensics examination point of view. In this paper, we follow a current conventional
approach to analyze Digsby log data, which considers Windows registry and directory files …
and at the same time providing an opportunity to end users to communicate over online
social networks. Due to providing versatile services and facilities, the usage of Digsby by
end users has diverted the attention of intelligence agencies to look into its log data from
digital forensics examination point of view. In this paper, we follow a current conventional
approach to analyze Digsby log data, which considers Windows registry and directory files …
Abstract
Digsby is a versatile nature application, which can be used for instant messaging, emailing and at the same time providing an opportunity to end users to communicate over online social networks. Due to providing versatile services and facilities, the usage of Digsby by end users has diverted the attention of intelligence agencies to look into its log data from digital forensics examination point of view. In this paper, we follow a current conventional approach to analyze Digsby log data, which considers Windows registry and directory files as a vital source of evidence related to cyber crimes, specifically in case of Digsby usage. We have also analyzed the password encryption method used by the Digsby developers and discussed the expected insider attack. In addition, we have developed an application to assist analysts in decrypting Digsby user password.
Springer
Showing the best result for this search. See all results