wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

AN EVENT-BASED DIGITAL FORENSIC INVESTIGATION

profile
Gajendrasingh Rajpurohit
Mar 14, 2022
1 Like
0 Discussions
50 Reads

To preserve the state of the digital objects at the digital crime scene, the crime scene is searched for evidence. The goal of this phase is to recognize the digital objects that may contain information about the incident.

The first phase is to define a target that will be used to locate the evidence. For example, if you are looking for a file named foo.txt, then the target would have a name of foo.txt. If you are looking for a file with “bar” in the content, then the target would have “bar” in the content.

Second phase is to extract data from the crime scene in some search pattern.

Third phase is to compare the extracted data with the target. After new evidence is found

Fourth phase updates the general knowledge about the investigation so that more targets can be defined. 

The phases have been organized into the basic requirements of an investigation: namely that we need to search for evidence that shows the causes and effects of an event and we need to develop hypotheses about the events that occurred at the crime scene. Each phase has a clear goal and requirements and procedures can be developed accordingly. We have also clearly outlined the definitions and concepts that were used in this framework. Choosing a process model is a subjective process and there will likely never be an agreement on a single model. Each must be evaluated with respect to how it can scale for future technologies and how it can handle different types of investigations. 


Comments ()


Sign in

Read Next

Procedure For Corporate High-Tech Investigations

Blog banner

IT service level agreement

Blog banner

Deadlock

Blog banner

Cache memory

Blog banner

CoWIN

Blog banner

Why is ITSM important in IT organization?

Blog banner

Cyber Attacks -- Trends Patterns and Security Countermeasures

Blog banner

Developments in Modern Operating Systems

Blog banner

EMAIL INVESTIGATION

Blog banner

geographic information system (GIS)

Blog banner

How to Encrypt and Decrypt Using GNU PGP

Blog banner

Personalized Movie Recommendations with Data Science

Blog banner

Cyber Laws In India and Around the World

Blog banner

Excel records

Blog banner

EVOLUTION OF THE MIRCOPROCESSOR

Blog banner

Veg Mix Pickle

Blog banner

PPT methodology

Blog banner

TRELLO

Blog banner

OPERATING SYSTEM

Blog banner

Mendeley (management software)

Blog banner

Digital black market or dark net poses a national security threat?

Blog banner

Cyber Forensic in the Banking sector

Blog banner

Understanding E-mail Servers

Blog banner

Threat management

Blog banner

ROLE OF THE COMPUTER FORENSICS TOOLS AND TECHNIQUES

Blog banner

Cyber Forensics

Blog banner

Evolution of OS

Blog banner

Review on Cyber Forensics and its Analysis Tools

Blog banner

Kernel in Operating System

Blog banner

Swiggi

Blog banner

Microsoft powerpoint presentation

Blog banner

Stephen Hawking : A Remarkable Physicist

Blog banner

Deadlock

Blog banner

10 Interesting Facts about Death Note

Blog banner

Deadlock Prevention

Blog banner

IT GOVERNANCE

Blog banner

A Survey of Anti-Forensic Techniques: Methods, Challenges, and Countermeasures

Blog banner

KPMG (Klynveld Peat Marwick Goerdeler)

Blog banner

Define Instagram.

Blog banner

RAID

Blog banner

JUSTICE FOR EVERY “BEZUBAAN ANIMAL”

Blog banner

File system implementation

Blog banner