wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

AN EVENT-BASED DIGITAL FORENSIC INVESTIGATION

profile
Gajendrasingh Rajpurohit
Mar 14, 2022
1 Like
0 Discussions
50 Reads

To preserve the state of the digital objects at the digital crime scene, the crime scene is searched for evidence. The goal of this phase is to recognize the digital objects that may contain information about the incident.

The first phase is to define a target that will be used to locate the evidence. For example, if you are looking for a file named foo.txt, then the target would have a name of foo.txt. If you are looking for a file with “bar” in the content, then the target would have “bar” in the content.

Second phase is to extract data from the crime scene in some search pattern.

Third phase is to compare the extracted data with the target. After new evidence is found

Fourth phase updates the general knowledge about the investigation so that more targets can be defined. 

The phases have been organized into the basic requirements of an investigation: namely that we need to search for evidence that shows the causes and effects of an event and we need to develop hypotheses about the events that occurred at the crime scene. Each phase has a clear goal and requirements and procedures can be developed accordingly. We have also clearly outlined the definitions and concepts that were used in this framework. Choosing a process model is a subjective process and there will likely never be an agreement on a single model. Each must be evaluated with respect to how it can scale for future technologies and how it can handle different types of investigations. 


Comments ()


Sign in

Read Next

Every body is beautiful

Blog banner

12 Principles of Animation

Blog banner

Severe landslides continue to cause concern in Joshimath, Uttarakhand

Blog banner

It's all about our Brain.- The Brain Metaphor

Blog banner

Digital Balance: Keeping Children Mindful in the Screen Age

Blog banner

Direct Memory Access

Blog banner

Zomato (Income Sources)

Blog banner

Solving Problems with AI: The Power of Search Algorithms

Blog banner

Smartsheet

Blog banner

Web Site

Blog banner

Teamwork

Blog banner

Creating Digitally Signed Document

Blog banner

Memory Management

Blog banner

How To Implement Search Engine Marketing (Sem) Strategy Effectively

Blog banner

Big Data Architecture

Blog banner

Friendship

Blog banner

Worms, viruses and Bots

Blog banner

How India made the GIS its Own, and its Use in Infrastructural Developments

Blog banner

SNAPCHAT

Blog banner

Electronic Funds Transfer

Blog banner

Types of Threads

Blog banner

Threat from Inside: Educating the Employees Against Cyber Threats

Blog banner

Why Inconel 625 and Monel 400 Remain Unbeatable in Refinery Applications?

Blog banner

Virtual memory

Blog banner

Shoulders

Blog banner

Python as a tool for Data science task & project

Blog banner

Jio .....A Revolution ?? ??

Blog banner

Virtual memory

Blog banner

Trends that began during the pandemic

Blog banner

Multithreading in Operating System

Blog banner

Threads

Blog banner

Session Hijacking

Blog banner

Deadlock and Starvation

Blog banner

Electronic Evidence in Cyber Forensics

Blog banner

Proton mail

Blog banner

Image Steganography: Hiding Secrets in Plain Sight

Blog banner

Operating system

Blog banner

Memory management

Blog banner

Computer Security

Blog banner

Types of Hackers

Blog banner

What is OS Fingerprinting?

Blog banner

CYBERPEACEKEEPING: NEW WAYS TO PREVENT AND MANAGE CYBERATTACKS

Blog banner