Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
Basics of digital forensics
Basics of digital forensics
Basics of digital forensics
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Recommended: Basics of digital forensics
For conducting a investigation the key goal is to uncover and present the truth. so there are some basic steps that should be followed while conducting an investigation. The steps are:
1. Preparation: first is to generate a plan of action to conduct a effective digital investigation and to obtain supporting resourses and basic materials
2. Survey: it is to find the potential source of digital evidence from the crime scene with the organisation
3. Preservation: this method includes preservation of in situ evidence including isolation of system present in the network
4. Examination and analysis: Searching for and interpreting trace evidence. Some process models use the terms examination and analysis interchangeably.
5. Presentation: it
…show more content…
the Abstraction layers that translate Raw Data into a form so that the investigator can find the errors. The Potential for error in data representation is unique to digital crime scene and requires extra precaution by the investigators such as compairing the results of multiple tools and inspecting the data at lower levels to double check the veracity of information that has been displayed through the forensic tools . digital investigator while searching a digital crime scene may encounter information which may have personal data and even evidences relating to other crimes he …show more content…
The main goal of this model to describe the flow of information and can be implemented at each step in the process to handle the data . like this the model address the overall management of case , indivual task and recognizes the preventation of information leakage in order to maintain authencity and integrity of digital evidence.
This model is applied to any technology . the strength is the notion of a continuous flow of information which emphasizes the importance of maintaining the chain of custody and protecting privacy.
Subphase Model:
1. It reduces the amount of data to be analysed
2. It assess the skill level of the suspect
3. Recovery of erased files
4. To find hidden
Evidence analysis and ranging is the most crucial stage of investigation. The success of the case exposure lies in the gradual evidence research and collecting prior to the laboratory analysis. The CSI systematically makes his way through the crime scene collects all potential evidence, tagging, logging and packaging so it remains intact on its way to the lab. Depending on the task breakdown of the CSI unit he may or may not analyze the evidence in the lab.
Every piece of information must be traceable back to the data input that produced it. The main action of audit trail is captures a sources of all data items at the time of getting entrance into the system. The other constituent of input control and security involves data security rules and measures to protect data from being or lost or damaged. The records retention policy is the practice of storing documents in a safe location and making sure to see to legal requirements or business needs. Input security and control also involves the process of encrypting or encryption of data so only users with the code it software can read
Digital Forensic is the process of uncovering and interpreting electronic data that can be used in a court of law. It requires a set of standards to show how the information that is gathered, preserve, and analyzed is strictly followed. The analysts need to understand the evolution of the current technology and how it will impact how they gather their information. The investigator is able to uncover evidence and analyze it to gain the understanding of the motives, crime, and the criminal’s identity to help solve the crime. As computers and technology continue to become a part of our everyday lives, the cyber realm contains a growing realm for evince in all types of criminal investigations (Cummings, 2008) Digital forensics is a way to connect information security and law enforcement. It ensures that the digital evidence is collected in a way that it can make it into the courts in an unhampered or uncontaminated way (Dlamini, M., Eloff, J. & Eloff, M., 2009).
On 5 October 2009, computer equipment from a network data closet was stolen from BCBST. The items stolen were 57 unencrypted hard drives which contained over 300,000 video recording and over one million audio recordings. According to Whitman & Mattord (2010), confidentiality, integrity, and availability makes up the C.I.A triangle which is the basis of Committee on National Security model for information security, an industrial standard, (Whitman & Mattord, 2010). Confidentiality can be a synonym for encryption but also means only the people with the correct permission can access the information. One of the major security issue is the hard drives were not encrypted. The hard drives should be encrypted to prevent people from reading the information the computer. Software can be purchased which will encrypt files on hard drive with such as Folder Lock, SensiGuard, Secure IT, and more. There are open source encrypting software which are free for use which could have been used. If the hard drives were not needed, the data should hav...
Forensic science has paved the way to a new world of technological advancements in solving crime, through DNA analysis, new technology such as M-Vac, improving systems such as CODIS and other investigative methods. As forensic science technology advances, the chance of an individual being able to commit a crime and walk away free without leaving any trace of evidence will lessen. While forensic science has its limitations, it can be the only way to provide an accurate account of what actually occurred at some crime scenes.
Analysis: Examination results are reviewed by the investigation team for their value in the case.
Investigators must ensure the integrity of all evidence collected, analyzed, processed and presented to a courtroom and jury. The reason that this is important is because the improper collection and analysis of evidence can lead to compromised data and potential damage to a prosecution. The seizure and analysis of digital evidence can be particularly challenging but is just as critical to a case as physical evidence. There are specific procedures that must be met to ensure the successful collection and analysis of digital media and guidelines or best practices for collection of all evidence, both physical and digital that must be followed. Conducting the proper steps in an investigation regarding the collection and processing of evidence and the proper chain of custody requirements can ensure a successful outcome in solving a case and a successful prosecution.
The scientific method is the analyzation of evidence, to examine a case from every angle possible, to not give up on an investigation until all of the angles are covered and to not allow personal emotions create a bias in their mind (Osterburg 2010). A scientific method example would be when an investigator arrives to a crime scene, they would first search the area for clues and see if something doesn’t seem right. Next they would have to search for different forms of evidence, most important would be trace evidence because it can provide DNA evidence which can also link a suspect to the crime. There are many more ways evidence and other clues can be harvested from a crime scene but it is up to the investigator to use their knowledge and help find the person responsible for the crime
In most crimes committed today criminals’ leave behind digital evidence that can be recovered by digital forensic experts and digital forensic tools.
What did they do ? Before we talk about it any further, we have to know some definitions that we use in digital forensics and digital evidence, not only two of them but the others too. This chapter will explain about it . Before we talk about it any further, we have to know the definition of what we are talking about. In the introduction we already know what digital forensic and digital evidence shortly are. In this chapter, we will more explore what they are, and some state that we found when we search about digital forensic and digital evidence. Computer forensics is a broad field and applied to the handling of crimes related to information technology. The goal of computer forensic is to securing and analyzing digital
The biggest challenge investigators face and who is involved with high tech crime is the fast-paced constant evolving nature of technology. When companies come out with new devices or new versions of old devices which is almost all the time, and those who gather digital evidence must remain current to be able to locate and preserve all potential evidence. As technology evolves the capacities of these devices will rapidly increase while their form factor grows continually smaller. Investigators must preserve digital evidence to make sure it is suitable for presentation in court as well. Investigators must first never change a crime scene or alter evidence. It is their goal to document and preserve the scene exactly as it was when the crime occurred. Extreme caution and care is needed because the mere act of documenting or cataloging a crime scene means that investigators are interacting with the scene. The second concern is the physical fragility of the evidence. Care must be taken to keep items from getting wet, stepped on etc, this can also be applied to digital evidence. Investigators have been able to examine hard disk drives that have been through fires because the drives are usually air and water tight and impervious to temperatures into the thousands of degrees. The third issue is that digital evidence can be lo...
resolve problems. With the scientific method you have four steps to follow which include defining the
Crime scene investigation is the use of physical evidence at the scene of the crime committed, also reasonable and unreasonable reasoning to gain knowledge of the events surrounding the crime. Criminal investigators pursues to establish the methods. Motives, and identities of criminal. This paper will go into great depths of how to conduct an investigation and the proper way to obtain the information. After reading this paper you should be able to know step by step how to keep notes, take accurate photos and a variety of other things that will allow you to conduct a successful investigation.
On September 11, 2001, the United States was attacked by terrorists. On that very fateful day, the twin towers in New York City were destroyed, the south wing of the pentagon was engulfed by flames, and a plane crash filled with innocent passengers found in Stonycreek Township, Pennsylvania. These events killed a total of 2,977 innocent men and woman. Following this event, the United States government were thinking of an easier way of identification for citizens, to reduce the threat of terrorism. When it comes to the citizens of the United States, the National Identification Cards should not be invested in, for it is a threat to the citizen’s livelihood and privacy.
Computers; they are a part of or in millions of homes; they are an intricate part of just about every if not all successful businesses, the government, and the military. Computers have become common place in today’s society and the lives of the people who live in it. They have crossed every national, racial, cultural, educational, and financial barrier, which consequently ushered in the information age. A computer is a programmable electronic device that can store, retrieve and process data, and they come in all shapes, and sizes. They can be used for and in just about anything. As stated before, they are used in just about every aspect of modern society. They are so fundamental to modern society that it would be disastrous to society without them. As stated before, there are many areas in modern society that are run by computers. They play an intricate part of millions of homes in the world. Office workers in business, government and the military may use them to write letters, keep rosters, create budgets, find information, manage projects, communicate with workers, and so on. They are used in education, medicine, music, law enforcement, and unfortunately crime. Because computers have become such a part of the world and how it operates, there is a tremendous responsibility for those who are in control of these computers and the vital information that they carry, to manage and protect them properly. This is management and protection is vital because any loss or damage could be disastrous for the affected entity. For example, a mistake or intentional alteration of a personal credit file could affect ones ability to buy a car or home, or can lead to legal actions against the affected person until the mistake or intentional alteration has been corrected. Therefore, with the advent of computers in the information age, and all of the intentional and unintentional violations against them, comes the need to safeguard them and the information they carry with strong systems and policies of computer security.