Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Magic Bytes

Advances in Cyberology and the Advent of the Next-Gen Information Revolution
First few hex values that are the signature of the corresponding file type are called Magic Bytes
Published in Chapter:
Forensics Analysis of NTFS File Systems
Kumarbhai Shamjibhai Sondarva (Sardar Vallabhbhai National Institute of Technology, India), Adarsh Kumar (Sardar Vallabhbhai National Institute of Technology, India), Bhavesh N. Gohil (Sardar Vallabhbhai National Institute of Technology, India), Sankita J. Patel (Sardar Vallabhbhai National Institute of Technology, India), Sarang Rajvansh (National Forensics Sciences University, India), and Ramya T. Shah (National Forensic Sciences University, India)
DOI: 10.4018/978-1-6684-8133-2.ch008
Abstract
The internet and computers are reaching everywhere, and all are getting connected through it. Users are utilizing computers to make life easier and work faster. At the same time, many attacks and instances of cybercrime have happened. Therefore, digital forensics is necessary and plays a crucial role. NTFS is one of the most popular file systems used by the Windows operating system, and this chapter provides information for forensic analysis of NTFS file system. This chapter describes digital forensics, stages of digital forensics, and types of digital forensics. NTFS is discussed in brief along with the master file table (MFT). In the same section, it also discusses the method to detect the hidden data in the boot sector, analysis of registry, prefetch, shellbags, and web browsers. They have discussed the collection of volatile and non-volatile data. It also provides the artifacts which an investigator must be seeking, along with the tools used to collect and analyze them and strategies used for investigation and analysis. Data recovery and file carving are also discussed.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR