Chapter 6 : Conducting Digital Investigations Flashcards
What the use of forensics trusted methodologies and techniques ensure
That the analysis, interpretation, and reporting of evidence are reliable, objective, and transparent
forensic computing
The process of identifying, preserving, analyzing and presenting digital evidence in a manner that is legally acceptable.
The most common steps for conducting a complete and competent
digital investigation
- *Preparation
- *Survey/Identification
- *Preservation
- *Examination and Analysis
- *Presentation
Preparation
Generating a plan of action to conduct an effective digital investigation, and obtaining supporting resources and materials
Survey/Identification:
Finding potential sources of digital evidence (e.g., at a
crime scene, within an organization, or on the Internet)
Preservation:
Preventing changes of in situ digital evidence, including isolating the system on the network, securing relevant log files, and collecting volatile data that would be lost when the system is turned off. This step includes subsequent collection or acquisition
Examination and Analysis
Searching for and interpreting trace evidence.
Some process models use the terms examination and analysis interchangeably
Presentation
Reporting of findings in a manner which satisfies the
context of the investigation, whether it be legal, corporate, military, or any other
Distinction between examination and Analysis in forensic
**forensic examination is the process of extracting and
viewing information from the evidence, and making it available for analysis.
**forensic analysis is the application of the scientific method and
critical thinking to address the fundamental questions in an investigation:
who, what, where, when, how, and why
What is the end goal of most digital
investigation
To identify a person who is responsible and therefore the digital investigation needs to be tied to a physical investigation.
Digital Crime scene preservation
Preventing changes in potential digital evidence, including network isolation, collecting volatile
data, and copying entire digital environment
Accusation or Incident Alert
Every process has a starting point—a place, event, or for lack of a better term, a “shot from a starting gun” that signals that the race has begun
What Computer security professionals should obtain
instructions and written authorization
from their attorneys before gathering digital evidence relating to an investigation within their organization.
Why digital investigators should establish thresholds
in order to prioritize cases and make decisions about how to allocate resources
What threshold considerations include
the likelihood of missing exculpatory evidence and seriousness of the offense