18046622. CYBER RECOVERY FORENSIC KIT -- APPLICATION-BASED GRANULARITY simplified abstract (Dell Products L.P.)

From WikiPatents
Revision as of 05:45, 26 April 2024 by Wikipatents (talk | contribs) (Creating a new page)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

CYBER RECOVERY FORENSIC KIT -- APPLICATION-BASED GRANULARITY

Organization Name

Dell Products L.P.

Inventor(s)

Ofir Ezrielev of Be'er Sheba (IL)

Jehuda Shemer of Kfar Saba (IL)

Amihai Savir of Newton MA (US)

CYBER RECOVERY FORENSIC KIT -- APPLICATION-BASED GRANULARITY - A simplified explanation of the abstract

This abstract first appeared for US patent application 18046622 titled 'CYBER RECOVERY FORENSIC KIT -- APPLICATION-BASED GRANULARITY

Simplified Explanation

The abstract describes a forensic kit with a granular infected backup that can be used to evaluate a production system infected with malware or corruption.

  • The forensic kit includes copies of infected components or related components from the production system.
  • The kit is provided to investigators for forensic analysis.

Potential Applications

This technology can be used in digital forensics investigations to analyze and understand the impact of malware or corruption on a production system.

Problems Solved

1. Efficiently evaluating and analyzing infected production systems. 2. Providing investigators with a comprehensive forensic kit for analysis.

Benefits

1. Improved understanding of malware or corruption impact. 2. Enhanced forensic analysis capabilities. 3. Streamlined investigation process.

Potential Commercial Applications

Digital forensics companies can utilize this technology to offer specialized services for investigating malware-infected systems.

Possible Prior Art

One possible prior art could be the use of forensic tools and techniques to analyze infected systems, but the specific concept of a granular infected backup in a forensic kit may be novel.

Unanswered Questions

How does the forensic engine identify and select the infected components for inclusion in the forensic kit?

The abstract does not provide details on the specific methodology used by the forensic engine to determine which components are infected or related to infected components.

What measures are in place to ensure the integrity and security of the forensic kit during distribution to investigators?

There is no information on the security protocols or encryption methods used to protect the forensic kit during distribution to investigators.


Original Abstract Submitted

A forensic kit with a granular infected backup. A forensic engine may evaluate a production system that is infected with malware or other corruption and generate a forensic kit. The forensic kit may include copies of components of the production system that are infected or that are sufficiently related to infected components. The forensic kit may be provided to investigators.