When responding to a security incident in a system, several basic principles must be followed regarding the collection of pieces of evidence from the system. The capture of these pieces of evidence has to be done according to its order of volatility. In this sense, RAM memory constitute the most important element to capture, given its extreme volatility. RAM memory must be acquired and analyzed because the data it holds, which may belong to the system itself or to any other device connected to it, can survive a certain amount of time in it. Since RAM is a constantly changing element, it must be stood out that any action carried on the system under analysis will modify the contents of the RAM. In this article a comparative and an objective analysis has been carried out, showing the impact that the execution of some tools for the capture of RAM has on the system. This comparative study details both the private shared workspaces, for each of the processes executed by each of the tools used.
CITATION STYLE
Fuentes Martínez, M. (2021). Impact of Tools on the Acquisition of RAM Memory. International Journal of Cyber Forensics and Advanced Threat Investigations, 1(1–3), 3–17. https://doi.org/10.46386/ijcfati.v1i1-3.12
Mendeley helps you to discover research relevant for your work.