wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

AN EVENT-BASED DIGITAL FORENSIC INVESTIGATION

profile
Gajendrasingh Rajpurohit
Mar 14, 2022
1 Like
0 Discussions
50 Reads

To preserve the state of the digital objects at the digital crime scene, the crime scene is searched for evidence. The goal of this phase is to recognize the digital objects that may contain information about the incident.

The first phase is to define a target that will be used to locate the evidence. For example, if you are looking for a file named foo.txt, then the target would have a name of foo.txt. If you are looking for a file with “bar” in the content, then the target would have “bar” in the content.

Second phase is to extract data from the crime scene in some search pattern.

Third phase is to compare the extracted data with the target. After new evidence is found

Fourth phase updates the general knowledge about the investigation so that more targets can be defined. 

The phases have been organized into the basic requirements of an investigation: namely that we need to search for evidence that shows the causes and effects of an event and we need to develop hypotheses about the events that occurred at the crime scene. Each phase has a clear goal and requirements and procedures can be developed accordingly. We have also clearly outlined the definitions and concepts that were used in this framework. Choosing a process model is a subjective process and there will likely never be an agreement on a single model. Each must be evaluated with respect to how it can scale for future technologies and how it can handle different types of investigations. 


Comments ()


Sign in

Read Next

Uniprocessor Scheduling

Blog banner

Install Ubuntu in Vmware

Blog banner

The Golden Temple , Amritsar

Blog banner

INTERNET SECURITY

Blog banner

Virtual Memory

Blog banner

The Psychology of Diversity, Equity & Inclusion: How Inclusive Workplaces Boost Productivity

Blog banner

Tracking Emails & Email Crimes

Blog banner

File Management In OS

Blog banner

Crypto tax evasion

Blog banner

The Right way of cooking

Blog banner

VIRTUAL MACHINE

Blog banner

Why is online marketing is important in current scenario

Blog banner

Session Hijacking Techniques

Blog banner

Deadlock

Blog banner

Computer Security

Blog banner

Sagar Parikrama

Blog banner

Travel: Everything Everywhere!

Blog banner

"Can Lisp do Machine Learning?"

Blog banner

Meal Maharaj — 3 CP, 5 CP, 8 CP. Same Love, Different Portions

Blog banner

Platonic Solids

Blog banner

Pro-Tips On How To Keep your Foot Healthy

Blog banner

Health and fitness

Blog banner

Deadlock

Blog banner

Wrike

Blog banner

How to use GIT & GITHUB

Blog banner

21ST CENTURY PATRIARCHY

Blog banner

Define Instagram.

Blog banner

Automating OSINT tasks for efficient Cyber Forensics Investigations

Blog banner

Advanced Persistent Threats (APTs)

Blog banner

Virtual Machine

Blog banner

Social Media.

Blog banner

Direct Memory Access

Blog banner

MEMORY MANAGEMENT FILE

Blog banner

What Your Music Taste Reveals About Your Personality

Blog banner

Socket Programming in Java

Blog banner

Continual service improvement vs maintenance phase in IT

Blog banner

Constrained Management in IT

Blog banner

Super Garlicky Tomato Soup with Smashed White Beans

Blog banner

Women Empowerment

Blog banner

Twisted world

Blog banner

History of Money

Blog banner

Race Condition in Operating Theatre

Blog banner