IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Forensic Artifacts in Operating Systems Windows vs. Linux

Forensic Artifacts in Operating Systems Windows vs. Linux
View Sample PDF
Author(s): Noble Antwi (Illinois Institute of Technology, USA)
Copyright: 2025
Pages: 32
Source title: Leveraging Large Language Models for Quantum-Aware Cybersecurity
Source Author(s)/Editor(s): Hewa Majeed Zangana (Duhok Polytechnic University, Iraq)and Marwan Omar (Illinois Institute of Technology, USA)
DOI: 10.4018/979-8-3373-1102-9.ch006

Purchase

View Forensic Artifacts in Operating Systems Windows vs. Linux on the publisher's website for pricing and purchasing information.

Abstract

The rapid rise of cybercrime, fueled by increased reliance on digital systems, underscores the importance of effective digital forensics. This research investigates forensic artifacts within two widely used operating systems, Windows and Linux, to offer a detailed comparison of their impact on forensic practices. Digital forensic artifacts, such as user activity logs, system logs, application data, and volatile memory artifacts, are key sources of evidence that investigators rely on to reconstruct events, identify threats, and secure convictions in cybercrime cases.

Related Content

Hewa Majeed Zangana, Marwan Omar. © 2025. 28 pages.
Angel Justo Jones. © 2025. 38 pages.
Angel Justo Jones. © 2025. 38 pages.
Luay Albtosh. © 2025. 38 pages.
Ngozi Tracy Aleke, Ivan Livingstone Zziwa, Kwame Opoku-Appiah. © 2025. 26 pages.
Noble Antwi. © 2025. 32 pages.
Soby T. Ajimon, Sachil Kumar. © 2025. 46 pages.
Body Bottom