Computer Forensic Investigation

1451 Words3 Pages

Digital evidence shall be treated like other evidence but more sensitive due to the possibility of the data or evidence being corrupted. Digital evidence deals with a large amount of personal information and requires special training or tools to ensure its validity. A computer forensic investigation utilizes all means necessary to retrieve all evidence is maintained, custody is established, and the proper procedures are put in place so that nothing is compromised. The National Institute of Standards and Technology (NIST) an investigator will need to follow an uncompromising code of procedures. These procedures are a part of a layered defense and are set up to divert any modifications to the source disk. A very common hardware or software tool …show more content…

Planning is critical in making sure that your team has way forward and knows the right tools to bring to the job. Time is critical when collecting evidence because some evidence could be altered manipulated or even deleted. Additionally, creating a targeted workflow for your computer forensic team can cut the cost and reduce the time on a crime scene saving money. Acquisition, is a process that extremely important because it begins with the chain of custody and images the disk or electronic devices. #### Next, extraction and collection takes a forensic team deep inside the digital evidence pulling data out of computers, servers or electronic devices necessary to cyber forensics. The collection of the evidence is a pivotal step in this process because any evidence that can be collected appropriately and that is relevant to the case at hand can be beneficial for law enforcement. In addition to collecting digital evidence some cyber forensics teams may have to conduct traditional forensics so it is good practice to train on these types forensics as well. Teams should begin to collect data or electronic media in the following order: Central Processing Unit, cache and registered content; routing table, process table, and kernel statistics; memory; temporary file systems; hard disk data; remote logged data; data contained on archival media. (Best Practices in Digital Evidence Collection, 2009) Another challenge is collecting on mobile devices because of the constant changing of technology. Analyzation and exploitation deal with analyzing data that is collected and ensuring that it is exploited to subdue the criminal if necessary. Lastly, once the analysis is complete the final step in the cyber forensic process is reporting. Being able to draft a report to convict a cyber-criminal in deterring

Open Document