Forensics Journal - Stevenson University 2014 | Page 11
STEVENSON UNIVERSITY
collected in accordance with various ethical procedures. These ethical
procedures protect examiners and recovered evidence against any form
of corruption. Evidence can include any details such as passwords,
filenames, personal identifiable information in memory, and even
running programs and files. In the case of 3D and 2D print technology, this will include printers as the connected media.
information from a printer can identify the device by its Uniform
Resource Locator (URL), embedded by manufacturers within a small
microchip, which serves to monitor ink or toner supply (Hoekstra).
VULNERABILITIES AND LIMITATIONS
PRINTER FORENSICS
Unfortunately, printer technology has vulnerabilities and limitations
like other technological devices. In general, a maj