Digital Crime Investigation

717 Words2 Pages

For conducting a investigation the key goal is to uncover and present the truth. so there are some basic steps that should be followed while conducting an investigation. The steps are:
1. Preparation: first is to generate a plan of action to conduct a effective digital investigation and to obtain supporting resourses and basic materials
2. Survey: it is to find the potential source of digital evidence from the crime scene with the organisation
3. Preservation: this method includes preservation of in situ evidence including isolation of system present in the network
4. Examination and analysis: Searching for and interpreting trace evidence. Some process models use the terms examination and analysis interchangeably.
5. Presentation: it …show more content…

the Abstraction layers that translate Raw Data into a form so that the investigator can find the errors. The Potential for error in data representation is unique to digital crime scene and requires extra precaution by the investigators such as compairing the results of multiple tools and inspecting the data at lower levels to double check the veracity of information that has been displayed through the forensic tools . digital investigator while searching a digital crime scene may encounter information which may have personal data and even evidences relating to other crimes he …show more content…

The main goal of this model to describe the flow of information and can be implemented at each step in the process to handle the data . like this the model address the overall management of case , indivual task and recognizes the preventation of information leakage in order to maintain authencity and integrity of digital evidence.
This model is applied to any technology . the strength is the notion of a continuous flow of information which emphasizes the importance of maintaining the chain of custody and protecting privacy.

Subphase Model:

1. It reduces the amount of data to be analysed
2. It assess the skill level of the suspect
3. Recovery of erased files
4. To find hidden

Open Document