Question

In: Computer Science

List and describe common technical and regulatory steps of a forensic investigation from beginning to the...

List and describe common technical and regulatory steps of a forensic investigation from beginning to the end.

Solutions

Expert Solution

The field of computer forensics investigation is growing, especially as law enforcement and legal entities realize just how valuable information technology (IT) professionals are when it comes to investigative procedures. With the advent of cybercrime, tracking malicious online activity has become crucial for protecting private citizens, as well as preserving online operations in public safety, national security, government and law enforcement. Tracking digital activity allows investigators to connect cyber communications and digitally-stored information to physical evidence of criminal activity; computer forensics also allows investigators to uncover premeditated criminal intent and may aid in the prevention of future cybercrimes.

There are 8 steps for a forensic investigation

1.Prepare: you have to prepare specific forensics training, and all corporate policies and procedures, as well as practice investigations and examinations, which will prepare you for an “event.”

2.Identify: When approaching an incident scene—review what is happening on the computer screen. If data is being deleted, pull the power plug from the wall; else, perform real-time actions. Identify whatever is happening around.

3. Preserve: Once the system-specific “volatile” data is retrieved, then turn off the machine, remove it from the scene, and power it up in an isolated environment. Perform a full system image capture of the data on the machine and hash the image with original data to verify.

4. Select: Once you have a verified copy of the available data, start the investigation of data by selecting potential evidence files, datasets, and locations data could be stored.

5.Examine: Check for potential hidden storage locations of data such as slack space, unallocated space, and in front of File Allocation Table (FAT) space on hard drives.Also check-in registry entries or root directories for additional indicators of data storage activity.

6. Classify: Evaluate data in potential locations for relevance to the current investigation. Check the relevancy of the data found.

7.Analyze: Review data from relevant locations. Ensure data is readable, legible, and relevant to the investigation.

8. Present: Correlate all data reviewed to investigation papers (warrants, corporate documents, etc.). Prepare data report for presentation


Related Solutions

Need response as soon as possible. List and briefly describe the steps to conducting an investigation...
Need response as soon as possible. List and briefly describe the steps to conducting an investigation of misconduct. Then describe the three possible conclusions that can be drawn upon completing such an investigation.
list and describe the steps of process evaluation
list and describe the steps of process evaluation
List and describe the steps in the power-on procedure
List and describe the steps in the power-on procedure
List the common respiratory sounds and describe their significance?
List the common respiratory sounds and describe their significance?
List and describe common forms of fraud and abuse.
List and describe common forms of fraud and abuse.
Describe the steps in the immune response, beginning with an antigen entering the body and ending...
Describe the steps in the immune response, beginning with an antigen entering the body and ending with activation of the various B- and T-cell types.
Human Physiology Describe in detail the steps that lead to inflammation, beginning with the introduction of...
Human Physiology Describe in detail the steps that lead to inflammation, beginning with the introduction of pathogens into a wound, and ending with the formation of a clot. Include in your description the types of cytokines released and the various leukocytes involved.
List and describe the steps in the communication process. In the context of the communication process,...
List and describe the steps in the communication process. In the context of the communication process, please also describe the potential barriers to effective communication. Lastly, please also present some techniques and approaches useful in overcoming these barriers to effective communication.
list and describe the basic steps of conducting a descriptive epidemiologic study
list and describe the basic steps of conducting a descriptive epidemiologic study
View Video first then list and describe the steps to “The Clinical Reasoning Cycle”, and relate the steps to the nursing process.
what are the steps of clinical reasoning? relate the steps to the nursing processView Video first then list and describe the steps to “The Clinical Reasoning Cycle”, and relate the steps to the nursing process.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT