wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

AN EVENT-BASED DIGITAL FORENSIC INVESTIGATION

profile
Gajendrasingh Rajpurohit
Mar 14, 2022
1 Like
0 Discussions
50 Reads

To preserve the state of the digital objects at the digital crime scene, the crime scene is searched for evidence. The goal of this phase is to recognize the digital objects that may contain information about the incident.

The first phase is to define a target that will be used to locate the evidence. For example, if you are looking for a file named foo.txt, then the target would have a name of foo.txt. If you are looking for a file with “bar” in the content, then the target would have “bar” in the content.

Second phase is to extract data from the crime scene in some search pattern.

Third phase is to compare the extracted data with the target. After new evidence is found

Fourth phase updates the general knowledge about the investigation so that more targets can be defined. 

The phases have been organized into the basic requirements of an investigation: namely that we need to search for evidence that shows the causes and effects of an event and we need to develop hypotheses about the events that occurred at the crime scene. Each phase has a clear goal and requirements and procedures can be developed accordingly. We have also clearly outlined the definitions and concepts that were used in this framework. Choosing a process model is a subjective process and there will likely never be an agreement on a single model. Each must be evaluated with respect to how it can scale for future technologies and how it can handle different types of investigations. 


Comments ()


Sign in

Read Next

GIS Applications: How Different Industries are Leveraging Geospatial Data

Blog banner

Basic Security For SOAP Services

Blog banner

Southern Turkey Earthquake: Causes and Consequences of a Tragic Natural Disaster

Blog banner

OS assignment 3

Blog banner

Domain Name System

Blog banner

File Allocation Methods

Blog banner

Simple STEM Activities for Toddlers That Spark Curiosity

Blog banner

A Short History of GIS

Blog banner

How to setup a professional looking business account on Instagram?

Blog banner

Wedding photographer

Blog banner

Social Engineering Deceptions and Defenses

Blog banner

The Everyday Parenting Dilemma: Safety Vs Independence

Blog banner

Telegram and it's features

Blog banner

Vikrant’s first blog

Blog banner

INTRANET

Blog banner

Open Source Project By Google

Blog banner

Practical Implementation of Client Server model using TCP/IP.

Blog banner

“CONSISTENCY” in Social Media Marketing

Blog banner

Image Steganography: Hiding Secrets in Plain Sight

Blog banner

Hot Mango Pickle (Methiyu)

Blog banner

21ST CENTURY PATRIARCHY

Blog banner

Why Data Security Is Important

Blog banner

Zero-Click Searches: How To Stay Visible In Google’s New Era

Blog banner

Respondo Launches Revolutionary Video Discussion App

Blog banner

Danger assessment in GIS

Blog banner

Kernel Modes: User Mode vs. Kernel Mode - 80

Blog banner

RAID

Blog banner

Operating Systems

Blog banner

Carrot Pickle With Raisins (lagan Nu Achar)

Blog banner

SQL Injection

Blog banner

geographic information system (GIS)

Blog banner

Memory Management

Blog banner

Mumbai Metro 3

Blog banner

Top 10 Logos and their meanings

Blog banner

Linker

Blog banner

Types of Big Data

Blog banner

Virtual machine and virtualizing

Blog banner

Fault tolerance

Blog banner

Electronic Funds Transfer

Blog banner

10 Interesting Facts about Death Note

Blog banner

A Traveller’s Guide to Offbeat Places in Arcadia, Florida

Blog banner

How to Encrypt and Decrypt Using GNU PGP

Blog banner