This chapter explains how to back up both user's personal files and system files. It discusses System Protection, which creates restore points to keep copies of some files around temporarily. This ...feature helps user fix minor mishaps on the spot without fumbling around with external disks. A simple way to back up items from user account is to copy files to an external disk. Windows 10's File History feature is an alternative to the simple method for backing up files described earlier and is an upgrade to the Windows Backup feature released with Windows 7. System Restore is the component of System Protection that protects user's important system files the ones Windows 10 needs to work correctly. System Restore automatically creates a restore point daily. BitLocker drive encryption is about confidentiality. BitLocker drive encryption ensures that lost or stolen data can not be read by prying eyes.
Windows 7 is a new operating system and, like any new technical environment, it has notable implications for computer forensics examiners. The impact of this new operating system will not be as ...dramatic as the move from Windows XP to Windows Vista. However, changes to this operating system mirror many changes in consumer usage of technology and present both opportunities and challenges for investigators. Arguably, the most important challenge to computer forensics examiners is access to the suspect's files on a computer. The introduction of BitLocker, which debuted with Microsoft's Vista operating system, provided a major barrier to investigators because this encryption tool could encrypt at the file, folder or drive level. Further advances to this tool in Windows 7 create even greater barriers to access; Microsoft's BitLocker To Go now goes beyond just hard drive encryption but also encrypts a system's associated devices. This research will also identify changes, which were introduced with Windows 7, and in response to a shift in consumer demand. The most notable shift in consumer demand, found by the authors of this research, is in Microsoft's integrated touch-screen capabilities.
The Analysis of Security Weakness in BitLocker Technology Jiang Yi-ming; Liu Sheng-li
2010 Second International Conference on Networks Security, Wireless Communications and Trusted Computing,
2010-April, Letnik:
1
Conference Proceeding
BitLocker technology uses Trusted Platform Module (TPM) to build the trust chain of system booting to protect the integrity of the system components from destruction. This technology can prevent the ...attacker from tampering the system boot files by Boot kit. This paper expounds how to achieve the boot protection by BitLocker technology, analyzes the potential security weaknesses of this technology, and puts forward some measures to improve its security.
Defense technology of anti forensic Suhyung Jo; Dowon Hong
2008 International Conference on Control, Automation and Systems,
2008-Oct.
Conference Proceeding
An anti-forensic is the technology which it collects witness data which are disadvantageous for a self among data stored in the computer or the mobile equipment or doesnpsilat analyze and obstructs a ...forensic. The data enciphering which it is one among the anti-forensic technique codes when storing data in a disc. It is the decoded when reading data technique. The various programs of Microsoft Office, Adobe PDF, WinRar, AlZip, and etc. provide the encryption of data. In these environments, the knowledge of over certain level about the digital device like a computer and ability of technique are needed in order to collect evidences. Particularly, it inquires into the technique of reaction which confronts with data hiding and modulation, evidence deletion, data enciphering, BitLocker drive encryption and can find out the evidence of the digital forensic.
The technical environment continues to change and impact the work of digital investigations. This research provides a framework within which computer forensics investigators can take advantage of new ...or different types of evidence from Microsoftpsilas Vista operating system (ldquoVistardquo). Moreover, this paper will also indicate the many challenges that investigators will encounter when faced with the Vista platform. The focus herein will be on changes associated with new security, encryption and file restoration features. These features vary according to the version of Vista and these differences will also be discussed. This research will also detail the integrity of data recovery procedures through detailed experiments used to identify how data could be manipulated by a perpetrator in Vista as compared to previous versions of Microsoftpsilas operating systems. Ultimately, this paper will indicate that enhancements in security and encryption associated with Encrypted File System (EFS) as well as BitLocker Drive Encryption are very problematic for investigators. Vista has serious implications for computer forensics investigations. Nevertheless, this research will guide the digital investigator through the labyrinth of new challenges, to effect a more thorough investigation of digital evidence.