An Ontology for Digital Forensics in IT Security Incidents - OPUS
An Ontology for Digital Forensics in IT Security Incidents - OPUS
An Ontology for Digital Forensics in IT Security Incidents - OPUS
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
72 APPENDIX A. EXTRACTION TOOL LISTINGS<br />
F<strong>in</strong>ished writ<strong>in</strong>g Hardware . rdfs<br />
Start writ<strong>in</strong>g Memory . rdfs (7.0 KB )<br />
F<strong>in</strong>ished writ<strong>in</strong>g Memory . rdfs<br />
Start writ<strong>in</strong>g Network . rdfs (4.0 KB )<br />
F<strong>in</strong>ished writ<strong>in</strong>g Network . rdfs<br />
Start writ<strong>in</strong>g Software . rdfs (1.0 KB )<br />
F<strong>in</strong>ished writ<strong>in</strong>g Software . rdfs<br />
F<strong>in</strong>ished load<strong>in</strong>g <strong>Ontology</strong><br />
Start NTFS 2 RDF<br />
F<strong>in</strong>ished NTFS 2 RDF<br />
Start check<strong>in</strong>g files 1/3<br />
Check<strong>in</strong>g file generated_harddisk . rdf<br />
OK<br />
F<strong>in</strong>ished check<strong>in</strong>g files 1/3<br />
Start writ<strong>in</strong>g to DB 1/3<br />
Start writ<strong>in</strong>g generated_harddisk . rdf (8.6650390625 MB )<br />
F<strong>in</strong>ished writ<strong>in</strong>g generated_harddisk . rdf<br />
F<strong>in</strong>ished writ<strong>in</strong>g to DB 1/3<br />
Start MEM 2 RDF<br />
F<strong>in</strong>ished MEM 2 RDF<br />
Start check<strong>in</strong>g files 2/3<br />
Check<strong>in</strong>g file generated_processes . rdf<br />
OK<br />
Check<strong>in</strong>g file generated_Registry_MEM . rdf<br />
OK<br />
.<br />
.<br />
.<br />
OK<br />
F<strong>in</strong>ished check<strong>in</strong>g files 2/3<br />
Start writ<strong>in</strong>g to DB 2/3<br />
Start writ<strong>in</strong>g generated_processes . rdf (8.369140625 MB )<br />
F<strong>in</strong>ished writ<strong>in</strong>g generated_processes . rdf<br />
Start writ<strong>in</strong>g generated_Registry_MEM . rdf (0.0 KB )<br />
F<strong>in</strong>ished writ<strong>in</strong>g generated_Registry_MEM . rdf<br />
.<br />
.<br />
.<br />
F<strong>in</strong>ished writ<strong>in</strong>g to DB 2/3<br />
Start Registry 2 RDF<br />
F<strong>in</strong>ished Registry 2 RDF<br />
Start Users<br />
F<strong>in</strong>ished Users<br />
Start Additional Edges<br />
F<strong>in</strong>ished Additional Edges<br />
Start check<strong>in</strong>g files 3/3<br />
.<br />
.<br />
.<br />
Check<strong>in</strong>g file _WINDOWS_system32_config_software_hdd . rdf<br />
OK<br />
Check<strong>in</strong>g file _WINDOWS_system32_config_SECUR<strong>IT</strong>Y_hdd . rdf<br />
OK<br />
Check<strong>in</strong>g file _WINDOWS_system32_config_default_hdd . rdf<br />
OK<br />
Check<strong>in</strong>g file _WINDOWS_system32_config_SAM_hdd . rdf<br />
OK<br />
Check<strong>in</strong>g file _WINDOWS_system32_config_system_hdd . rdf<br />
OK<br />
Check<strong>in</strong>g file Users . rdf<br />
OK<br />
Check<strong>in</strong>g file additional_edges . rdf