The Introduction Of Digital Forensic

Print   

02 Nov 2017

Disclaimer:
This essay has been written and submitted by students and is not an example of our work. Please click this link to view samples of our professional work witten by our professional essay writers. Any opinions, findings, conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of EssayCompany.

Introduction of Digital Forensic

As introduce Digital forensics, how to define Digital Forensic in terms of methods towards approach as labelled in six process steps which are preservation evidences gather from the scene, collection of clues and finding compound in various type, validation whether the information are correct, identification whether is belongs to the suspect culprit, interpretation understand the process of the data gather and how presentation of evidences found from the information which gathered and reconstruct the evidences, where suspect could be a criminal or could be assisting other people to use unauthorized actions to be achieve some operation plans. These steps could helped us to gather more evidences where peoples such as computer forensic investigator and forensic auditors are trying to use commonly in forensic investigation, so that they able to present in court to verify the judgement of the civil actions and also disciplinary actions on the suspects.

International Journal of Computer Science and Security (IJCSS), Volume (5) : Issue (1) : 2011

Ankit Agarwal, Megha Gupta, Saurabh Gupta & Prof. (Dr.) S.C. Gupta

http://www.cscjournals.org/csc/manuscript/Journals/IJCSS/volume5/Issue1/IJCSS-438.pdf

(Baryamureeba & Tushabe, 2006; Carrier & Spafford, 2003; Whitcomb, 2002)

http://researchrepository.murdoch.edu.au/3716/1/digital_evidence.pdf

Key Principle of Cyber Forensics

Standardization - which is no changing of the data gather

Evidence Gathering - who only competent persons should able to examine the digital evidence

Evidence Handling - how this information can be used in documentation in evidences

Evidence Access - who does access to take the ownership protecting the evidences

Standardization

With the current situation where computer forensics teams are required to work any cross borders to track down the information to capture the cyber criminals. This has been always find difficulties in legislation which covered digital evidences compare with jurisdictions. So currently with the joining force with Law enforcement group peoples able to cooperate with them, working together and also the helped from the government across the world to standardized the principles as well as the best practices of computer forensics.

Evidence Gathering

One of the core principle of computer forensics analysis techniques for collecting digital evidences where needed to be carefully preserve the original files, this is because computer forensics practitioner basically will work on the preserve digital evidences, this is to ensure that there is be not cause any contaminated data and also tampered or alter with the evidences to prove the original of the data which they collected from. So that when during the court, the digital evidences present to the prosecutor, the proof of the data integrity must be intact as the original where they collected from.

Evidence Handling

When digital evidences collected from various locations, it will deliver through to many investigating agencies hands for analysis the information. Handle carefully and documenting all the information gathered from the evidences is very important key factors in computer forensics. Each of the expertise of the investigating team member must know no matter how, they need to be work together to ensure original of the documents handling carefully no missing digital evidences, all the investigating analysis and also the testing of the evidences which they gathered are properly documented.

Evidence Access

In the computer world society environment, any potential (criminal) people will have motive to do something with digital evidence, where they may do unauthorised access (possibly hacking or cracking to in the system getting the information viewing, get the copy of the information, delete the information of the data in order to gain some good deals outside, or set some viruses attack to the files in network service attacks. As above statement, we need to ensure protecting of digital evidences is well keep from tampering of evidences as well as unauthorized access is definitely important. This is to help the prosecutor able to justify the real facts to capture the criminals. Hence, there will be process follow where digital evidences are kept in the stored secure area environment. The important key factor is that computer forensics is only personnel team expertise is able to access the original copy of the digital evidence during the analysis of the data as well as after analysis the data.

Alastair Irons. Records Management Journal. Bradford: 2006. Vol. 16, Iss. 2; pg. 102

http://noormansah.blogspot.sg/2010/05/computer-forensics-and-records.html

By Adrian Grahams, eHow Contributor

http://www.ehow.com/info_8035487_four-principles-computer-forensics.html

Investigation Process

Preserve

Locate

Select

Analyse

Validate

Present



rev

Our Service Portfolio

jb

Want To Place An Order Quickly?

Then shoot us a message on Whatsapp, WeChat or Gmail. We are available 24/7 to assist you.

whatsapp

Do not panic, you are at the right place

jb

Visit Our essay writting help page to get all the details and guidence on availing our assiatance service.

Get 20% Discount, Now
£19 £14/ Per Page
14 days delivery time

Our writting assistance service is undoubtedly one of the most affordable writting assistance services and we have highly qualified professionls to help you with your work. So what are you waiting for, click below to order now.

Get An Instant Quote

ORDER TODAY!

Our experts are ready to assist you, call us to get a free quote or order now to get succeed in your academics writing.

Get a Free Quote Order Now