wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

AN EVENT-BASED DIGITAL FORENSIC INVESTIGATION

profile
Gajendrasingh Rajpurohit
Mar 14, 2022
1 Like
0 Discussions
50 Reads

To preserve the state of the digital objects at the digital crime scene, the crime scene is searched for evidence. The goal of this phase is to recognize the digital objects that may contain information about the incident.

The first phase is to define a target that will be used to locate the evidence. For example, if you are looking for a file named foo.txt, then the target would have a name of foo.txt. If you are looking for a file with “bar” in the content, then the target would have “bar” in the content.

Second phase is to extract data from the crime scene in some search pattern.

Third phase is to compare the extracted data with the target. After new evidence is found

Fourth phase updates the general knowledge about the investigation so that more targets can be defined. 

The phases have been organized into the basic requirements of an investigation: namely that we need to search for evidence that shows the causes and effects of an event and we need to develop hypotheses about the events that occurred at the crime scene. Each phase has a clear goal and requirements and procedures can be developed accordingly. We have also clearly outlined the definitions and concepts that were used in this framework. Choosing a process model is a subjective process and there will likely never be an agreement on a single model. Each must be evaluated with respect to how it can scale for future technologies and how it can handle different types of investigations. 


Comments ()


Sign in

Read Next

Man VS Nature

Blog banner

How Reading Books Shape a Child’s Imagination and Thinking?

Blog banner

Virtual memory

Blog banner

CYBERPEACEKEEPING: NEW WAYS TO PREVENT AND MANAGE CYBERATTACKS

Blog banner

File management

Blog banner

Cache Memory in Operating Systems

Blog banner

File management

Blog banner

A Brief Review on Cyber Forensics and its Analysis Tool

Blog banner

What your Favorite colour says about You?

Blog banner

CYBERBULLYING: Negative comments!

Blog banner

E-security systems | CCTV

Blog banner

Technical Challenges and Directions for Digital Forensics

Blog banner

MEMORY FORENSIC ACQUISITION AND ANALYSISOF MEMORY AND ITS TOOLS COMPARISON

Blog banner

How College Events Build Real-world Skills You Can’t Learn From Textbooks

Blog banner

10 Reasons to Date a South Indian Girl

Blog banner

Steganography and Steganalysis

Blog banner

Memory Partitioning

Blog banner

Explaining Buffer Overflow with Example

Blog banner

GIS Mapping

Blog banner

Cyber Forensic in the Banking sector

Blog banner

RAID and It's Levels

Blog banner

ONLINE NEWSROOMS

Blog banner

VIRTUAL MACHINE

Blog banner

Memory Management

Blog banner

Process, process creation and process termination

Blog banner

Smitten Kitchen Keepers

Blog banner

MODERN OPERATING SYSTEM

Blog banner

Khau Galli – Vile Parle

Blog banner

How to Run your First android App

Blog banner

Data-Driven Prediction of Virtual Item Prices in Online Games

Blog banner

Concept and definition of m-commerce

Blog banner

Is Social Media Marketing The Next Wave Of Digital Marketing?

Blog banner

John Titor: The Time Traveler

Blog banner

What's Better : Supervised or Unsupervised Learning

Blog banner

Data Science & AI

Blog banner

Fun Christmas Activities For Toddlers & Kids

Blog banner

What is E-commerce

Blog banner

Uniprocessor Scheduling

Blog banner

Introduction my self

Blog banner

Cloud Forensic Tools And Storage :A Review Paper

Blog banner

Unlocking Success: Mastering Google Ads Strategies

Blog banner

Proof-of-Stake (PoS)

Blog banner