Hauptseite: Unterschied zwischen den Versionen
Etduen (Diskussion | Beiträge) Keine Bearbeitungszusammenfassung |
Etduen (Diskussion | Beiträge) |
||
(417 dazwischenliegende Versionen von mehr als 100 Benutzern, die nicht angezeigt werden) | |||
Zeile 1: | Zeile 1: | ||
Willkommen | Willkommen auf dem IT-Forensik-Wiki der Hochschule Wismar. Hier werden wesentliche Begriffe zum Thema „Digitale Forensik“ erläutert. | ||
== | == Literatur == | ||
Antje Raab-Düsterhöft: [https://www.amazon.de/Forensik-Ein-Grundkurs-Antje-Raab-D%C3%BCsterh%C3%B6ft/dp/3662690896/ref=sr_1_1?crid=3R1C68K8I9D7G&dib=eyJ2IjoiMSJ9.uiOyjCoCVNBEDxYi_UywKURV45hgfjLaOTGRLZmHb3vTptUnwBld6SqiBl8NXzOVGk9f43125KCwp7Gnnf2gf8pTQI1Kis9kH_dZvoE4j1kz8G9RvagRT IT-Forensik - Ein Grundkurs. Springer Verlag, November 2024], ([https://link.springer.com/book/10.1007/978-3-662-69090-1 digitale Version]) | |||
[[Stefan Alfeis]]: '''Analyse von Fallback Methoden im Identity and Access | |||
Management'''. Master Thesis, Hochschule Wismar, September 2024 | |||
[[Pascal Stehling]]: '''Homomorphic Post-Quantum Cryptography - Evaluation of Module Learning with Error in Homomorphic Cryptography'''. Master Thesis, Hochschule Wismar, Oktober 2024 | |||
[[Kristin Dahnken]]: '''Privacy-Preserving Machine Learning in the Cloud: An Evaluation of Garbled Circuits for Secure Multi-Party Computation'''. Master Thesis, Hochschule Wismar, September 2024 | |||
[[Florian Weijers]]: '''Development of Forensic Strategies and Methods in Software-Defined Networks Submitted'''. Master Thesis, Hochschule Wismar, Juli 2024 | |||
[[Lukas Petrič]]: '''Umsetzbarkeit der OH-SzA des BSI mittels Open Source Lösungen'''. Master Thesis, Hochschule Wismar, September 2024 | |||
[[Abschlussarbeiten im Master Studiengang "IT-Sicherheit und Forensik"]] | |||
[[Abschlussarbeiten im Bachelor Studiengang "IT-Forensik"]] | |||
[ | [[Projektarbeiten]] | ||
[ | [[Forensik in DB]] | ||
== | |||
Artikel [https://t3n.de/news/digitale-verbrechen-was-macht-eigentlich-ein-it-forensiker-1629195/?utm_source=rss&utm_medium=feed&utm_campaign=t3n-news "Digitale Verbrechen: Was macht eigentlich ein IT-Forensiker?"] 10.6.2024 | |||
== Stichworte IT-Forensik == | |||
=== A === | |||
[[ACPO]] | |||
[[Adware]] | |||
[[Aggregation]] | |||
[[AmCache]] | |||
[[Angriffe auf Forensik-Software]] | |||
[[Anti-Forensik]] | |||
[[Anwendungsarchitektur]] | |||
[[Arbeitsspeicher]] | |||
[[Asset Relocation]] | |||
[[APT]] | |||
[[Autopsy]] | |||
[[Alternative Data Stream (ADS)]] | |||
=== B === | === B === | ||
[[BBED]] | |||
[[Betriebssystem]] | |||
[[Bitlocker]] | |||
[[Blacklisting]] | |||
[[BLOB]] | |||
[[BlockchainForensik|Blockchain Forensik]] | |||
[[Blockchainbasierte Datenbank]] | |||
[[Broken Authentication]] | |||
[[Brute Force]] | |||
[[BSI-Vorgehensmodell]] | [[BSI-Vorgehensmodell]] | ||
[[Bundesdatenschutzgesetz (BDSG)]] | |||
[[BurpSuite]] | |||
=== C === | === C === | ||
[[Cache]] | |||
[[Canarytoken]] | |||
[[CERT-Taxonomie]] | [[CERT-Taxonomie]] | ||
[[Chain of Custody]] | |||
[[Cheat Engine]] | |||
[[Checkliste IT-Forensik für Unternehmen]] | |||
[[Chip-Off]] | |||
[[Clickjacking]] | |||
[[Cloud Log Forensik]] | |||
[[Cold Backup]] | |||
[[Command-and-Control-Server]] | |||
[[Computer Sabotage]] | |||
[[Containervirtualisierung]] | |||
[[Cookies]] | |||
[[Cross Site Request Forgery (CSRF)]] | |||
[[Cross Site Scripting (XSS)]] | |||
[[CryptoLocker]] | |||
[[CSA - Cloud Security Alliance]] | |||
[[CTI - Cyber Threat Intelligence]] | |||
[[CVE - Common Vulnerabilities and Exposures]] | |||
[[Cybercrime]] | |||
=== D === | === D === | ||
[[Darknet]] | |||
[[Dateiheader]] | |||
[[Datenanalyse]] | |||
[[Datenbank Firewall]] | |||
[[Datenbankausführungsplan]] | |||
[[Datenbankforensik]] | |||
[[Datenreduktion]] | |||
[[Datensammlung]] | |||
[[Datenschutz in der IT-Forensik]] | |||
[[Datenvernichtung]] | |||
[[Datenverschleierung]] | |||
[[DDL & DML]] | |||
[[Deep Packet Inspection]] | |||
[[Deep Web]] | |||
[[Diamond-Modell]] | |||
[[Wörterbuchangriff|Dictionary Attack]] | |||
[[Diff]] | |||
[[Digitale Artefakte]] | |||
[[Digitale Forensik]] | [[Digitale Forensik]] | ||
[[DLL (.dll Dateien)]] | |||
[[DLP]] | |||
[[DNS-Tunneling]] | |||
[[Dokumentation]] | |||
[[DoS & DDoS]] | |||
[[Doxing]] | |||
[[.DS-Store]] | |||
[[Dual Use Software]] | |||
[[Dumpster Diving]] | |||
[[Dynamische Analyse]] | |||
=== E === | === E === | ||
[[E-Mail-Header]] | |||
[[E-Mail-Verschlüsselung und Signatur in der IT-Forensik]] | |||
[[eDiscovery]] | |||
[[Egg Hunting]] | |||
[[ENISA]] | |||
[[Ermittlungsprozess]] | [[Ermittlungsprozess]] | ||
[[Error Based SQL Injection]] | |||
[[Exchangeable Image File Format (EXIF)]] | |||
[[Exploit]] | |||
=== F === | |||
[[File Carving]] | |||
[[Fileless Malware]] | |||
[[Fingerprinting (Browser)]] | |||
[[Fingerprinting (Betriebssystem)]] | |||
[[Flash Speicher]] | |||
[[Flüchtige Daten]] | |||
[[Footprinting]] | |||
[[Forensik]] | |||
[[Forensic Data Mining]] | |||
[[Forensic Readiness]] | |||
[[Forensische Duplikation]] | |||
[[Forensischer Koffer]] | |||
[[Fragmentierung]] | |||
[[Fuzzing]] | |||
=== G === | === G === | ||
[[Geotag]] | |||
[[GeoIP-Datenbank]] | |||
[[Gerichtsfestigkeit]] | [[Gerichtsfestigkeit]] | ||
[[Google Hacking]] | |||
=== H === | |||
[[Hackback]] | |||
[[Hardware-Sicherheitsmodul]] | |||
[[Hashcat]] | |||
[[Hashwert]] | |||
[[Hilfstatort]] | |||
[[Honeypot]] | |||
[[Human Interface Device (HID)]] | |||
=== I === | === I === | ||
[[ICMP - Internet Control Message Protocol]] | |||
[[Identitätsanbieter]] | |||
[[IDS - Intrusion Detection System]] | |||
[[Image]] | |||
[[Imaging]] | |||
[[IMSI-Catcher]] | |||
[[Incident-Response-Team]] | [[Incident-Response-Team]] | ||
[[Indicator of Compromise]] | |||
[[Inline (Queries) SQL Injection]] | |||
[[Integrität]] | |||
[[IT-Forensik]] | [[IT-Forensik]] | ||
[[IT-Forensiker]] | |||
[[IT-Forensisches Gutachten]] | |||
[[IPS - Intrusion Prevention System]] | |||
=== J === | |||
[[Jailbreak]] | |||
[[John the Ripper]] | |||
[[Journaling-Dateisystem]] | |||
[[Juice Jacking]] | |||
[[Jump Lists]] | |||
=== K === | |||
[[Installieren eines Live-Kali-Linux-System auf USB-Stick|Kali-Linux-Live-System auf USB-Stick installieren]] | |||
[[Kaltstartattacke]] | |||
[[Kausalität in der Forensik]] | |||
[[Key Derivation Function]] | |||
[[Kerberos]] | |||
[[Keystroke Injection Attack Tool]] | |||
[[Korrelation]] | |||
[[Keylogger]] | |||
=== L === | === L === | ||
[[Lateral Movement]] | |||
[[LDAP-Injection]] | |||
[[Litigation Hold]] | |||
[[Live-Forensik]] | [[Live-Forensik]] | ||
[[Local file inclusion]] | |||
[[Locard'sche Regel]] | |||
[[Lockheed Martin Cyber Kill Chain]] | |||
[[Log-File]] | |||
[[LogMining]] | |||
[[Logical Volume Manager (LVM)]] | |||
=== M === | |||
[[Magnet Axiom]] | |||
[[Makrovirus]] | |||
[[Malware]] | |||
[[Malware-Klassen]] | |||
[[MariaDB-Audit-Plugin|MariaDB Audit Plugin]] | |||
[[Memory Forensics]] | |||
[[Metadaten]] | |||
[[Mobiltelefon-Forensik]] | |||
[[Metadata Carving]] | |||
=== N === | |||
[[Netcat]] | |||
[[Netflow]] | |||
[[Never-Touch-Original]] | |||
[[Nmap]] | |||
[[NTFS]] | |||
[[Nutzdaten]] | |||
=== O === | === O === | ||
[[OCR]] | |||
[[Online-Forensik]] | [[Online-Forensik]] | ||
[[Offline-Forensik]] | [[Offline-Forensik]] | ||
[[Ontologie & Semantik]] | |||
[[Oracle DB]] (Forensische Aspekte) | |||
[[Order of Volatility]] | |||
[[OSINT]] | |||
[[OSINT-Werkzeug]] | |||
[[Out-of-Band]] | |||
=== P === | === P === | ||
[[Pass-the-Hash-Attack]] | |||
[[Passwortsicherheit]] | |||
[[Payload]] | |||
[[Partition]] | |||
[[PCMCIA]] | |||
[[Penetrationstest]] | |||
[[PhotoDNA]] | |||
[[Public Key Infrastructure (PKI)|PKI]] | |||
[[Plausible Deniability]] | |||
[[PostgreSQL Command Execution]] | |||
[[Post-Mortem-Analyse]] | [[Post-Mortem-Analyse]] | ||
[[Prepared Statement]] | |||
[[Privilege Escalation]] | |||
[[Prozess der Mobiltelefon Forensik]] | |||
[[Prüfsumme]] | |||
[[Public Key Infrastructure (PKI)|Public Key Infrastructure]] | |||
[[Purview eDiscovery (Microsoft)]] | |||
[[P2P (Peer-to-Peer) Software / Netzwerke]] | |||
[[PIC]] | |||
=== Q === | |||
[[Query Log]] | |||
[[QRT: Quick Reaction Team]] | |||
[[QRT: Quick Response Team]] | |||
=== R === | |||
[[Radare 2 - Reverse Engineering Framework]] | |||
[[Rainbow Table]] | |||
[[Ransomware]] | |||
[[Privilege_Escalation|Rechteausweitung]] | |||
[[Redo Logs]] | |||
[[Registry]] | |||
[[Remote Access Trojaner (RAT)]] | |||
[[Replay Attack]] | |||
[[Reverse Engineering]] | |||
[[Rogue Access Point & Evil Twin]] | |||
[[Rootkit]] | |||
=== S === | === S === | ||
[[SAP-Modell]] | [[SAP-Modell]] | ||
[[Sandbox]] | |||
[[Schwachstelle]] | |||
[[Security Information and Event Management (SIEM)]] | |||
[[Security Operations Center (SOC)]] | |||
[[Seitenkanalattacke]] | |||
[[Semantik]] | |||
[[Server Side Request Forgery]] | |||
[[Shellbags]] | |||
[[ShimCache]] | |||
[[Sigma]] | |||
[[Skimming]] | |||
[[Skript-Kiddie]] | |||
[[Slack Space]] | |||
[[Sleuthkit]] | |||
[[Smishing]] | |||
[[Sparse Image]] | |||
[[Stack-basierte Buffer-Overflow Angriffe in Microsoft Windows]] | |||
[[Statische Analyse]] | |||
[[Sniffing]] | |||
[[Sealbag]] | |||
[[Secure Erase]] | |||
[[Server Side Request Forgery]] | |||
[[SpiderFoot]] | |||
[[Spuren]] | |||
[[SQL Injection]] | |||
[[SQL Stored Procedures]] | |||
[[SQLite Datenbanken auslesen mittels Python]] | |||
[[Sqlmap]] | |||
[[SSL Inspection]] | |||
[[Steganographie]] | |||
[[Steghide]] | |||
[[Supply Chain Attack]] | |||
=== T === | === T === | ||
[[Tatort]] | |||
[[Team Win Recovery Project]] | |||
[[Threat Intelligence]] | |||
[[Thumbnail Cache unter Windows]] | |||
[[Thunderspy]] | |||
[[Timeline]] | [[Timeline]] | ||
[[Triage]] | |||
[[Trigger in DBMS]] | |||
[[Trugspur]] | |||
[[Tsurugi-Linux]] | |||
[[Totmannschalter]] | |||
=== U === | |||
[[Unallocated Data (Nicht zugeordnete Daten)]]<br> | |||
[[UNION Based SQL Injection]] | |||
=== V === | |||
[[Verfügbarkeit]] | |||
[[Vertraulichkeit]] | |||
[[Vertraulichkeit in Datenbanksystemen]] | |||
[[VPN]] | |||
[[Volume Shadow Copies]] | |||
[[Vorsorge für die IT-Forensik]] | |||
[[Video-Forensik]] | |||
=== W === | === W === | ||
[[W-Fragen]] | [[W-Fragen]] | ||
[[Watering-Holes]] | |||
[[Web-Application-Firewall]] | |||
[[Whitelisting]] | |||
[[Why-Because-Analyse (WBA)]] | |||
[[Windows-RAM auslesen]] | |||
[[Windows-Papierkorb]] | |||
[[Windows-Prefetch]] | |||
[[Wiping]] | |||
[[Wireshark]] | |||
[[Write Blocker]] | |||
[[Wörterbuchangriff]] | |||
[[Worm]] | |||
=== X === | |||
[[Xmount]] | |||
=== Y === | |||
[[Yara Regeln]] | |||
=== Z === | === Z === | ||
[[Zeit]] | [[Zeit]] | ||
[[Zeitstempel]] | |||
[[Zeitbasierte SQL Injection Attacken]] | |||
[[Zenmap]] | |||
[[Zero-Day-Exploit]] | |||
[[ | [[Ziele einer forensischen Untersuchung nach A. Geschonneck]] | ||
== Fernstudiengänge an der Hochschule Wismar (berufsbegleitend) == | |||
[ | [https://www.wings.hs-wismar.de/de/fernstudium_bachelor/it_forensik IT-Forensik, Bachelor] | ||
[ | [https://www.wings.hs-wismar.de/de/fernstudium_master/it_sicherheit_und_forensik/ IT-Sicherheit und Forensik, Master] | ||
== Starthilfen == | == Starthilfen == |
Aktuelle Version vom 24. November 2024, 18:28 Uhr
Willkommen auf dem IT-Forensik-Wiki der Hochschule Wismar. Hier werden wesentliche Begriffe zum Thema „Digitale Forensik“ erläutert.
Literatur
Antje Raab-Düsterhöft: IT-Forensik - Ein Grundkurs. Springer Verlag, November 2024, (digitale Version)
Stefan Alfeis: Analyse von Fallback Methoden im Identity and Access Management. Master Thesis, Hochschule Wismar, September 2024
Pascal Stehling: Homomorphic Post-Quantum Cryptography - Evaluation of Module Learning with Error in Homomorphic Cryptography. Master Thesis, Hochschule Wismar, Oktober 2024
Kristin Dahnken: Privacy-Preserving Machine Learning in the Cloud: An Evaluation of Garbled Circuits for Secure Multi-Party Computation. Master Thesis, Hochschule Wismar, September 2024
Florian Weijers: Development of Forensic Strategies and Methods in Software-Defined Networks Submitted. Master Thesis, Hochschule Wismar, Juli 2024
Lukas Petrič: Umsetzbarkeit der OH-SzA des BSI mittels Open Source Lösungen. Master Thesis, Hochschule Wismar, September 2024
Abschlussarbeiten im Master Studiengang "IT-Sicherheit und Forensik"
Abschlussarbeiten im Bachelor Studiengang "IT-Forensik"
Artikel "Digitale Verbrechen: Was macht eigentlich ein IT-Forensiker?" 10.6.2024
Stichworte IT-Forensik
A
Angriffe auf Forensik-Software
B
Bundesdatenschutzgesetz (BDSG)
C
Checkliste IT-Forensik für Unternehmen
Cross Site Request Forgery (CSRF)
CTI - Cyber Threat Intelligence
CVE - Common Vulnerabilities and Exposures
D
Datenschutz in der IT-Forensik
E
E-Mail-Verschlüsselung und Signatur in der IT-Forensik
Exchangeable Image File Format (EXIF)
F
Fingerprinting (Betriebssystem)
G
H
I
ICMP - Internet Control Message Protocol
IDS - Intrusion Detection System
Inline (Queries) SQL Injection
IPS - Intrusion Prevention System
J
K
Kali-Linux-Live-System auf USB-Stick installieren
Keystroke Injection Attack Tool
L
Lockheed Martin Cyber Kill Chain
M
N
O
Oracle DB (Forensische Aspekte)
P
Prozess der Mobiltelefon Forensik
Purview eDiscovery (Microsoft)
P2P (Peer-to-Peer) Software / Netzwerke
Q
R
Radare 2 - Reverse Engineering Framework
Rogue Access Point & Evil Twin
S
Security Information and Event Management (SIEM)
Security Operations Center (SOC)
Stack-basierte Buffer-Overflow Angriffe in Microsoft Windows
SQLite Datenbanken auslesen mittels Python
T
U
Unallocated Data (Nicht zugeordnete Daten)
UNION Based SQL Injection
V
Vertraulichkeit in Datenbanksystemen
W
X
Y
Z
Zeitbasierte SQL Injection Attacken
Ziele einer forensischen Untersuchung nach A. Geschonneck
Fernstudiengänge an der Hochschule Wismar (berufsbegleitend)
IT-Sicherheit und Forensik, Master
Starthilfen
- Hilfe zur Benutzung und Konfiguration der Wiki-Software finden Sie im Benutzerhandbuch
- Liste der Konfigurationsvariablen
- MediaWiki-FAQ
- Mailingliste neuer MediaWiki-Versionen
- Übersetze MediaWiki für deine Sprache
- Erfahre, wie du Spam auf deinem Wiki bekämpfen kannst