wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

AN EVENT-BASED DIGITAL FORENSIC INVESTIGATION

profile
Gajendrasingh Rajpurohit
Mar 14, 2022
1 Like
0 Discussions
50 Reads

To preserve the state of the digital objects at the digital crime scene, the crime scene is searched for evidence. The goal of this phase is to recognize the digital objects that may contain information about the incident.

The first phase is to define a target that will be used to locate the evidence. For example, if you are looking for a file named foo.txt, then the target would have a name of foo.txt. If you are looking for a file with “bar” in the content, then the target would have “bar” in the content.

Second phase is to extract data from the crime scene in some search pattern.

Third phase is to compare the extracted data with the target. After new evidence is found

Fourth phase updates the general knowledge about the investigation so that more targets can be defined. 

The phases have been organized into the basic requirements of an investigation: namely that we need to search for evidence that shows the causes and effects of an event and we need to develop hypotheses about the events that occurred at the crime scene. Each phase has a clear goal and requirements and procedures can be developed accordingly. We have also clearly outlined the definitions and concepts that were used in this framework. Choosing a process model is a subjective process and there will likely never be an agreement on a single model. Each must be evaluated with respect to how it can scale for future technologies and how it can handle different types of investigations. 


Comments ()


Sign in

Read Next

Cache memory

Blog banner

On-Page SEO

Blog banner

10 Things To Do On Valentine's Day If You're Single

Blog banner

File and File System Structure

Blog banner

Dental Problems That Start Small But Should Never Be Ignored

Blog banner

Interrupts in operating system.

Blog banner

Memory Management

Blog banner

Race condition

Blog banner

Processing Crime and Incident Scenes

Blog banner

A BLOG ON MYSQL

Blog banner

A-B-C of Networking: Part-3 (Topology [Ring, Tree, Mesh])

Blog banner

All you need to know about Cassandra

Blog banner

Network Forensics Tools and Techniques

Blog banner

QUANTUM COMPUTING IN SECURITY:A GAME CHANGER IN DIGITAL WORLD

Blog banner

Starvation

Blog banner

LEMON PICKLE SWEET AND MILD HOT

Blog banner

File management In Operating System

Blog banner

Photography

Blog banner

Paralysis/Paralysis Stroke

Blog banner

OPERATING SYSTEM

Blog banner

Importance of Education

Blog banner

The Role of Data Provenance and Lineage in Modern Data Science

Blog banner

Why Data Security Is Important

Blog banner

MORDERN UNIX SYSTEM

Blog banner

Review on Cyber Forensics and its Analysis Tools

Blog banner

OS assignment 3

Blog banner

GIS in Disaster Management

Blog banner

Wedding photographer

Blog banner

Deadlock

Blog banner

STUDY OF SYSTEM HACKING TOOLS

Blog banner

Daycare Centres Help Children Transition into Structured Learning

Blog banner

Women empowerment

Blog banner

10 Alien Encounters and Abduction Stories

Blog banner

Digital Balance: Keeping Children Mindful in the Screen Age

Blog banner

Operating system

Blog banner

DATA WRANGLING

Blog banner

COMPUTER FORENSICS AND GRAPHICS

Blog banner

Windows Operating System

Blog banner

Modern Operating Systems.

Blog banner

Synchronization

Blog banner

How to tie a Tie

Blog banner

IT RISK

Blog banner