Wednesday, April 3, 2019
Digital Forensic Methodology and Strategy
digital Forensic methodology and StrategyIntroductiondigital forensic can be exposit as the cyber security mostly apply to secure to identify, preserve, analyze and posture digital selective information exhibit in the manner it volition be legally accepted in either legal process. Digital forensic is mostly applied in recovering that entangles investigating of materials on a digital media platform and network. (Britz, 2013 ) This forensic uses the method of scientific research where the constitute up is mostly grounded on the fields of forensic learning. The certification of the forensic science requires a code of conduct of neutral and decent approaches to querys. This digital forensic has a good history since it was discovered by the original pile who saw the need to protect the entropy in any digital thingumajig. It is estimated to be over 40 years old with the first gadget making the first show up around 1970. This was due to a demand made by the community to the coquet of law.The first choose was about finance which was d wizard using a electronic computer. The hackers used the computer to steal m nonpareily hence in that respect was a need to practice up with a strategy. The hacking does not only involve stealing however also getting access of the information from a computer without the ascendency from the owner. In 1980s, training courses for digital forensic were developed aimed at provide the learner with the knowledge of forensics. Organizations such as Certified Fraud Examiners, gamey Technology disgust Investigational Associations (HTCIA) among other digital forensic companies were form to hand out with those frauds. (Britz, Digital Forensics and Cyber Crime, 2010) Currently, there are so umteen courses in the universities to put forward degrees in the fields such as computer forensics and also digital probes.In those early days, forensic tools like MACE and Norton came up with the elemental resurgence abilities suc h as unformat and undelete, the investigation was under individual stationed in a specific workstation. (Janczewski, 2010) Today some software corroborate been formed to do the resembling and effectively. Government has come up with the standardization of the equivalent as from 1984. On the same year, the FBI came up with a structured body, estimator Analysis Response Team (CART), assigned with the responsibility of examining the separate as per the law.Digital forensic methodologyObtaining authorization for investigation.There first methods involve getting authority so as one can trip the investigation. This is so because nobody can allow one to enter into some other without permission, once the permission is granted, the investigations kick off. The person mandate to do the investigation must be experienced with the full knowledge of the forensic investigation and examining. The investigation pull up stakes be carried out clearly and the fraud should be met and amended. Th e investigator also is expected to use the current methods of digital forensic due to rapid growth in the technology, meaning advanced methods should apply. ascertain evidence locationsAfter investigation, the investigator forget provide the evidence locations. This core that the investigator will determine where the location at which the fraud has occurred, hence go to those places and find out what might have happened. Different locations will contain different kinds of frauds this will lead to different kinds of locations. (Dawson, 2015) Each evidence will also contain different measure of resolving it. Digital forensic differ from one country to another and the measure interpreted to deal with such frauds is still different. The evidence depending on the location will also entail different kind of selective information which will border for a specific way of investigating it. The location also will contain different kind of nation which will mean that that population has a certain way of dealing with the forensic frauds.Determining and confident(p) techniques to find and symbolize significant dataIn this method, the investigator is unavoidable to clear techniques to find and interpret significant data. There are so many techniques used to determine find data and consequently interpret the same data. Some techniques used are, histogram, random number generation, descriptive statistics and many others. When the data has been found, then it is interpreted using different methods. The forensic data will differ from one fraud to another and also from one location to the next. The collected data which is salutary analyzed will take a crap the best result.Summarize and provide explanation of conclusionsAfter doing all what is required, the data summarized and the conclusion is provided. The investigator of the fraud makes the explanation and it should be correct without any mistake to avoid wrong conclusion. Depending on the nature of the fraud, the e xplanation abandoned should provide a clear answer of what might have bypast wrong. (Gladyshev, 2015) The data must be given correctly for the future adduce if need be. As per the client, the explanation can be taken to the court of law alongside the sampled data as the evidence.The importance of using forensic tools to collect and analyze evidence.Many organizations have adopted forensic tools and have achieved many things. Forensic tools have collected protected and analyzed digital evidence and applied it where applicable. Can be in legal matters, disciplinal matters or even in employment tribunals. The forensic tools have been reclaimable in the following circumstancesIt has been useful in disputed transactions in an organization.Widely used in allegations pertaing to employee misconductUsed to show legal and regulatory complianceWidely used in a court of law to assist in law enforcement investigationsSupporting insurance claims when a loss occurs in an organization.It is a tool to meet divine revelation requirement in civil claims. hashishing in the context of digital forensicsHash determine are used in cases of the electronic evidence. Mostly used in the psychometric test of process of computer forensics. The hash sets are used to make sure that the original copy is not altered. During the process, an run across is made of the original. (Bossler, 2014) The original hard drive will be taken as a hash value also. The examination is done in the beginning the hash value is taken. In the case where the values are the same the copy is treated as the original while where the values are different, then the copy is put in a question. As the examination is concluded, a third value s commonly taken. The three hash values which include, original hard drive, imaged hard drive before the examination and imaged hard drive after the examination, must match. Again the hash values can be used in the court of law to validate evidencesIn another circumstances ha sh value can be used in discovery process. The discovery process where the hash value has been mostly applied is in court of law.How do you batten down that the evidence collected has not been tampered with (i.e., after collection)?Avoid contamination of the data- the specimen /data collected should be original and not contaminated with other materials. (DeFranco, 2014) palm appropriately-make sure that the data collected is packed, stored and ferried correctly.Label accurately-the evidence collected should be labeled correctly to avoid confusion such that even if there can be any claim, it can be clearly produced. look total security- the evidence which has been collected should be secure and tamper demonstrationMaintain continuity-handling of the evidence should be recorded, also when the evidence pass from one person to another should also be recorded, this maintenance will ensure that the evidence is purely maintained.Why and how is this important to prove in a court of law?Th e collected data as per the explanation preceding(prenominal) is original. It can be proven in the court of law because there will be a full evidence that the evidence was well maintained.ReferencesBossler, A. M. (2014). Cybercrime and digital forensics an introduction. New York Routledge.Britz, M. (2013 ). Computer forensics and cyber crime an introduction . Boston Pearson.Britz, M. (2010). Digital Forensics and Cyber Crime. Berlin Springe.Dawson, M. (2015). New threats and countermeasures in digital crime and cyber terrorism . Hershey An Imprint of IGI Globa.DeFranco, J. F. ( 2014). What every engineer should know about cyber security and digital forensics. Boca Raton CRC Press.Gladyshev, P. (2015). Digital Forensics and Cyber Crime . Heidelberg Springer.Janczewski, L. (2010). Cyber warfare and cyber terrorism. Hershey Information Science Reference.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.