18046622. CYBER RECOVERY FORENSIC KIT -- APPLICATION-BASED GRANULARITY simplified abstract (Dell Products L.P.)
Contents
- 1 CYBER RECOVERY FORENSIC KIT -- APPLICATION-BASED GRANULARITY
- 1.1 Organization Name
- 1.2 Inventor(s)
- 1.3 CYBER RECOVERY FORENSIC KIT -- APPLICATION-BASED GRANULARITY - A simplified explanation of the abstract
- 1.4 Simplified Explanation
- 1.5 Potential Applications
- 1.6 Problems Solved
- 1.7 Benefits
- 1.8 Potential Commercial Applications
- 1.9 Possible Prior Art
- 1.10 Unanswered Questions
- 1.11 Original Abstract Submitted
CYBER RECOVERY FORENSIC KIT -- APPLICATION-BASED GRANULARITY
Organization Name
Inventor(s)
Ofir Ezrielev of Be'er Sheba (IL)
Jehuda Shemer of Kfar Saba (IL)
Amihai Savir of Newton MA (US)
CYBER RECOVERY FORENSIC KIT -- APPLICATION-BASED GRANULARITY - A simplified explanation of the abstract
This abstract first appeared for US patent application 18046622 titled 'CYBER RECOVERY FORENSIC KIT -- APPLICATION-BASED GRANULARITY
Simplified Explanation
The abstract describes a forensic kit with a granular infected backup that can be used to evaluate a production system infected with malware or corruption.
- The forensic kit includes copies of infected components or related components from the production system.
- The kit is provided to investigators for forensic analysis.
Potential Applications
This technology can be used in digital forensics investigations to analyze and understand the impact of malware or corruption on a production system.
Problems Solved
1. Efficiently evaluating and analyzing infected production systems. 2. Providing investigators with a comprehensive forensic kit for analysis.
Benefits
1. Improved understanding of malware or corruption impact. 2. Enhanced forensic analysis capabilities. 3. Streamlined investigation process.
Potential Commercial Applications
Digital forensics companies can utilize this technology to offer specialized services for investigating malware-infected systems.
Possible Prior Art
One possible prior art could be the use of forensic tools and techniques to analyze infected systems, but the specific concept of a granular infected backup in a forensic kit may be novel.
Unanswered Questions
How does the forensic engine identify and select the infected components for inclusion in the forensic kit?
The abstract does not provide details on the specific methodology used by the forensic engine to determine which components are infected or related to infected components.
What measures are in place to ensure the integrity and security of the forensic kit during distribution to investigators?
There is no information on the security protocols or encryption methods used to protect the forensic kit during distribution to investigators.
Original Abstract Submitted
A forensic kit with a granular infected backup. A forensic engine may evaluate a production system that is infected with malware or other corruption and generate a forensic kit. The forensic kit may include copies of components of the production system that are infected or that are sufficiently related to infected components. The forensic kit may be provided to investigators.