wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

AN EVENT-BASED DIGITAL FORENSIC INVESTIGATION

profile
Gajendrasingh Rajpurohit
Mar 14, 2022
1 Like
0 Discussions
50 Reads

To preserve the state of the digital objects at the digital crime scene, the crime scene is searched for evidence. The goal of this phase is to recognize the digital objects that may contain information about the incident.

The first phase is to define a target that will be used to locate the evidence. For example, if you are looking for a file named foo.txt, then the target would have a name of foo.txt. If you are looking for a file with “bar” in the content, then the target would have “bar” in the content.

Second phase is to extract data from the crime scene in some search pattern.

Third phase is to compare the extracted data with the target. After new evidence is found

Fourth phase updates the general knowledge about the investigation so that more targets can be defined. 

The phases have been organized into the basic requirements of an investigation: namely that we need to search for evidence that shows the causes and effects of an event and we need to develop hypotheses about the events that occurred at the crime scene. Each phase has a clear goal and requirements and procedures can be developed accordingly. We have also clearly outlined the definitions and concepts that were used in this framework. Choosing a process model is a subjective process and there will likely never be an agreement on a single model. Each must be evaluated with respect to how it can scale for future technologies and how it can handle different types of investigations. 


Comments ()


Sign in

Read Next

Bitcoin sent using radio waves! No internet!

Blog banner

SECURITY TOOLS

Blog banner

Service Operations in ITSM

Blog banner

GOOGLE

Blog banner

What is Data, Information and Knowledge?

Blog banner

Kernel Memory Allocation In Linux.

Blog banner

Fault Tolerance

Blog banner

Operating system

Blog banner

Pooja Silver

Blog banner

Deadlock

Blog banner

Recipe of Paneer Butter Masala

Blog banner

The House ??of Patola Designs: Traditional Weaves with a Modern Twist

Blog banner

The Role of cryptography in cyber security

Blog banner

Mutual exclusion

Blog banner

(Input/Output) in os

Blog banner

virtual memory

Blog banner

Rapido

Blog banner

The New Dr. Frankenstein who will perform first full head transplant

Blog banner

Blog on Smartsheet.

Blog banner

Components of GIS

Blog banner

LINUX

Blog banner

Real-time Scheduling - 53003230061

Blog banner

Virtual Memory

Blog banner

Embaded operating system

Blog banner

Office Lunch Problems in Mumbai and How Tiffin Services Solve Them

Blog banner

Multicore and multithreading 171

Blog banner

10 Interesting Facts about Attack on Titan

Blog banner

MACHINE LEARNING

Blog banner

Explain the concept of ( MIS) Management information systems

Blog banner

Cache Memory

Blog banner

Software Piracy & Online Data Protection in Digital World

Blog banner

The Art Of Getting What You Want In Life....

Blog banner

How return on investment is defined in IT services

Blog banner

Cache memory

Blog banner

Carrot Pickle With Raisins (lagan Nu Achar)

Blog banner

Autonomy Vehicles: Future Ki Gadiya

Blog banner

Social Media.

Blog banner

Search Marketing In 2026: From Keywords To Credibility And User Intent

Blog banner

Linux Memory Management

Blog banner

What is time ? The term which has astonished Scientists

Blog banner

Benefits of yoga and meditation

Blog banner

Having passion in life

Blog banner