dc.contributor.author | Nouhra, Virona | |
dc.date.accessioned | 2021-10-20T06:44:49Z | |
dc.date.available | 2021-10-20T06:44:49Z | |
dc.date.issued | 2018 | |
dc.identifier.citation | Nouhra, V. (2018). Conducting a forensic investigation of Amazon Drive on Android devices (Master's thesis, Notre Dame University-Louaize, Zouk Mosbeh, Lebanon). Retrieved from http://ir.ndu.edu.lb/123456789/1375 | |
dc.identifier.uri | http://ir.ndu.edu.lb/123456789/1375 | |
dc.description | M.S. -- Faculty of Natural and Applied Sciences, Department of Computer Science, Notre Dame University, Louaize, 2018; "A thesis submitted in partial fulfillment of the requirements for the Master of Science in Computer Science"; Includes bibliographical references (leaves 77-81). | |
dc.description.abstract | In the last few years, Cloud Storage has taken a new turn in becoming the latest trend to create a huge impact in the IT world. Amazon Drive is a cloud storage mobile applications created by Amazon. This application provides online and easy access to documents, music, photos and videos saved in your cloud drive. Due to the importance and widespread of the cloud, not only regular users, but also criminals have taken advantage of the services provided by this new technology to commit digital crimes. Digital forensics is a branch of forensic sciences that aims at investigating digital evidence found on electronic devices to help combat cybercrimes. It aims at identifying, preserving. collecting, analyzing and reporting digital remnants. Digital forensics plays a key role in helping forensic investigators identify valuable and court admissible information. In this thesis, an analysis is performed on the digital artifacts that are left behind on an Android device after Amazon Drive have been accessed. Methods and tools were used to examine digital evidence, its importance and relevance, to allow examiners to secure the evidence properly. This thesis follows 31 four step digital forensic framework to follow a proper forensic investigation process. The results of this process has identified the location of the evidence related to the Amazon Drive account. In addition, the tiles and folders were identified and in some cases the content of some tiles was retrieved. This thesis showed that deleted files can also be acquired. | en_US |
dc.format.extent | iv, 81 leaves : color illustrations | |
dc.language.iso | en | en_US |
dc.publisher | Notre Dame University-Louaize | en_US |
dc.rights | Attribution-NonCommercial-NoDerivs 3.0 United States | * |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/3.0/us/ | * |
dc.subject.lcsh | Computer crimes--Investigation | |
dc.subject.lcsh | Digital forensic science | |
dc.subject.lcsh | Forensic sciences | |
dc.subject.lcsh | Cloud computing | |
dc.subject.lcsh | Mobile device forensics | |
dc.title | Conducting a forensic investigation of Amazon Drive on Android devices | en_US |
dc.type | Thesis | en_US |
dc.rights.license | This work is licensed under a Creative Commons Attribution-NonCommercial 3.0 United States License. (CC BY-NC 3.0 US) | |
dc.contributor.supervisor | Akiki, Pierre A., Ph.D. | en_US |
dc.contributor.department | Notre Dame University-Louaize. Department of Computer Sciences | en_US |
The following license files are associated with this item: