Preview

Digital Forensic Investigation

Good Essays
Open Document
Open Document
535 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Digital Forensic Investigation
The handling of evidence at the scene is critical to maintaining the integrity of the evidence (Bunting, 2012, p. 90). Proper tools for acquiring the evidence at the scene are essential. These tools can be categorized as discipline-specific hardware and software, and general tools and supplies. Bunting (2012), Gogolin (2013), Kral (2011) and Nelson, Phillips and Steuart (2010) provide lists of item that a digital forensics investigator should have at the scene. The table at the end of this section summarizes the suggestions of these authors.

Hardware & software
Data acquisition, particularly preserving volatile data, will be foremost in the mind of the digital forensics investigator upon arrival at the scene of the incident.

If the machines are running, and particularly if the machines must not be shut down to maintain the core business function, volatile information, such as the contents of RAM, USB drives are important for capturing information live machines. To image RAM on a Windows machine, the USB drives should contain WinEn. WinAcq should be included for a live Windows acquisition, and MacLockPick for acquiring data from live Macintosh and Linux platforms (Bunting, 2012, p. 96).
…show more content…
16). If resources allow, a spare response computer is suggested (Bunting, 2012, p. 96). A hardware disk imager is recommended (Gogolin, 2012, p. 16); although disk imaging capabilities are also present in certain forensic software (see below). A hardware write-blocker is recommended; although, software write-blockers are also available (see e.g., Lyle,

You May Also Find These Documents Helpful

  • Powerful Essays

    272. Newman, R. (2007). Computer Forensics: Evidence Collection and Managment. Boca Raton FL: Taylor & Francis Group. LLC.…

    • 4846 Words
    • 17 Pages
    Powerful Essays
  • Satisfactory Essays

    Iscs 451 Assignment 6

    • 576 Words
    • 3 Pages

    A checklist should be created off of the operating procedures and brought to each crime scene by the investigator. Every electronic device should be photographed before touching anything. The checklist should be followed step by step and every item needs to be put into an evidence bag and tagged. Then a chain of custody document needs to be created for every piece of evidence. No analysis should be done on the original copy of any device. All analysis should be done on system image copies of each…

    • 576 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    MGS 351 FINAL TIPS

    • 313 Words
    • 2 Pages

    digital forensics: acquire the evidence without changing) authenticate your recovered evidence is the same as original…

    • 313 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Helix3 Pro Step Action

    • 1321 Words
    • 5 Pages

    The destination media represents the HDD that will contain the output of the forensic acquisition. Before this process takes place, certain requirements must be met to ensure a successful and forensically sound acquisition.…

    • 1321 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Cis 417 Assignment 1

    • 755 Words
    • 4 Pages

    There are many challenges for a computer forensics specialist and everyone faces the same challenges. There first challenge is to find a way to examine an increasing number of digital devices, each containing an immense volume of data, in a timely manner with limited resources (Charles L Cohen, n.d.). Another challenge is the fact that offenders are finding easier ways to store data. They…

    • 755 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Assignment5

    • 285 Words
    • 1 Page

    The three phases of computer forensic investigations are; acquire the evidence, authenticate the evidence, and analyze the evidence. In acquiring the evidence the data is collected. Authenticating the evidence a chain of custody is used for the evidence to ensure its trustworthiness. Finally in analyzing the evidence the data is viewed and if need be a copy of the evidence can be created.…

    • 285 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Case Project 5-3 & 5-5

    • 865 Words
    • 4 Pages

    Under the silver platter doctrine, evidence obtained by state agents in an unreasonable search and seizure was admissible in a federal criminal trial, where no federal agent participated in a search and seizure and the state officers did not act solely on behalf of the United States (Hills, 1999). Simply put, federal officers cannot allow state police to do the dirty work, and then claim that they did not violate search and seizure rights. By analogy, no government agent can stand by, allow a private citizen to violate search and seizure strictures on the government 's behalf, and then claim innocence as to the violation (Hills, 1999).…

    • 865 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Lab 1

    • 414 Words
    • 2 Pages

    2. Which items within WinAudit’s initial report would you consider to be of critical importance in a computer forensic investigation?…

    • 414 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    forensics

    • 449 Words
    • 2 Pages

    What physical evidence did you find at the victim’s home? A box of matches, a space heater, beer bottles, Natalie’s wallet, a V-shaped burn pattern, burned outlet, a protected surface on the ground, crazed glass, and a puddle-shaped burn pattern.…

    • 449 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Forensics

    • 320 Words
    • 2 Pages

    • There were bloodstains on a shirt, and they found the pair of pants in his room.…

    • 320 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    forensic

    • 266 Words
    • 1 Page

    Information technology knowledge and skills are necessary tools of the forensic accountant in a world filled which paperless crimes. At minimum, forensic accountants must know the point at which they should contact an expert in computer hardware or software. Examples of ways that forensic accountants use information technology skills to quarantine data, extract data through data mining, design and implement controls over data manipulation, accumulate baseline information for comparison purpose, and analyze data.…

    • 266 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    After the preservation phase, forensics are required to locate and identify any evidence that can be used to aid the crime case. There are several locations where evidence are usually found such as in the hard drive on the user’s personal computer, laptop, smart phone or tablet (ACPO, 2012). It is also critical that forensics are aware of the intention of the particular investigation. This aids in the forensics' efforts of locating digital evidences that are relevant to the case. For example, in the case of a server intrusion, forensics should look out for signs such as a rootkit installation, analyze configuration files, logs files and etc. These are possible locations and processes where traces of evidence can be picked out from (Carrier and Spafford, 2003).…

    • 257 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Evidence is a type of proof. It is usually used to prove someone innocent or guilty. There are many different types of evidence, such as: testimony, direct, circumstantial, and physical evidence. However, according to the article “Forensic: Evidence, Clues, and Investigation” by Andrea Campbell, forensic evidence is the best evidence to present at a court case or trial.…

    • 226 Words
    • 1 Page
    Good Essays
  • Better Essays

    Forensic Investigations

    • 1177 Words
    • 5 Pages

    Dr. Edmond Locard’s Exchange Principle states, “Any action of an individual, and obviously the violent action constituting a crime, cannot occur without leaving a trace.” It is hard to say Locard’s Exchange Principle was not disregarded. After three months of expert investigation it was found that the DNA evidence that was discovered at the scene did not belong to Jennifer or Noura. Also Noura’s own DNA was not found at all at the scene of the crime. It is very hard to understand how Noura could have made extreme violent contact with her mother and not left any fingerprints, footprints, hair, skin cells, blood, bodily fluids, pieces of clothing or fibers behind. This lack of traces evidence sets off two different paths in my mind. One way leads you down a road of pure hatred for a parent. Everyone was felt this way one time or another in their life, where a disagreement or argument over something that is usually aimed at protecting the youth, leads to a massive outburst or feeling of rage, that is always immediately followed by guilt or remorse by a normal human being. But what happens when this rage affects a “not so normal” child. One with malice aforethought, that is just so tired of being controlled that they premeditate a murder and thoroughly clean any trace of evidence. The other path is the road Noura’s defense took. She is irrefutably innocent and Jennifer’s killer/killers are still on the loose.…

    • 1177 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Digital Forensics Paper

    • 1176 Words
    • 5 Pages

    The stages of this process include creating a full-fledged and distinctive occupation, establishing a national association that is given various responsibilities in regards to the profession, train the future practitioners through university sponsor programs that are established and solidified, and engage in political mobilization to gain political and legal support to give members a specific niche. It is evident that digital forensics is well on its way to being established as a profession due to the fact that many digital forensic programs are being offered and training individuals at universities and many of the law enforcement agencies in the United States staff practitioners. However, digital forensics still possesses many issues to becoming a full fledge profession, due to the fact that they do not have an established national association that represents its interests, educates the public, enforces a code of ethics, etc.; does not have a uniform training program in place; and possesses little to no political mobilization. I believe that if this field continues to advance as it has over the past forty years, it will indeed become a “true” profession in the near…

    • 1176 Words
    • 5 Pages
    Good Essays