Taking A Look At Digital Forensics

1612 Words4 Pages

This document provides information regarding the collection and examination of information from four sources of data that can be found on various devices. Furthermore, the sources of data have been written in the order to best reflect its usefulness in regards to network intrusion, malware installation, and insider file deletion. As a result, digital forensic investigators will acquire an enhanced understanding of data sources, the collection and examination process, and challenges that can occur during an investigation. Data Sources Used In Digital Forensic Investigations The advancement in technology has always been a double edged sword in human history. On one side, it provides a positive quality of life and advancement for humanity and …show more content…

Data has become the pinnacle of digital forensics and its ability to collect, examine, analyze, and report on compiled information. Kent et al. (2006) explains that the digital forensics process (Figure 1) will aid digital investigators in developing a better comprehension of an incident by effectively processing the data of a case. Furthermore, Whitcomb (2002) expounds that the “acquisition of digital information” must follow the legal and/or corporate procedures for the collection of digital evidence in accordance with the rules and regulations of the …show more content…

This knowledge would help the digital investigator prepare their forensic toolkit for acquisition of the digital evidence in an effective manner. Furthermore, this is significant because technology has become so prevalent and abundant that there can be various diverse media and interfaces found at a crime scene. According to Kent et al. (2006), some of the most frequent media discovered at crime scenes are “desktop computers, servers, network storage devices, and laptops”. Subsequently, digital forensics investigators must ensure that they have the proper equipment necessary for data collection of any of these media. Digital forensics investigators must be aware that this is very important because the collection of digital evidence is challenging because the information is a “product of the data stored, the application used to create and store it, and the computer system that directed these activities” (Noblett, Pollitt, & Presley,

Open Document