Information To Digital Forensics

Information To Digital Forensics

Computer forensics or digital forensics is a time period in computer science to obtain authorized proof found in digital media or computers storage. With digital forensic investigation, the investigator can find what occurred to the digital media equivalent to emails, hard disk, logs, computer system, litigation and the network itself. In lots of case, forensic investigation can produce how the crime may happened and the way we are able to protect ourselves in opposition to it next time.

Some the reason why we need to conduct a forensic investigation: 1. To collect evidences so that it can be utilized in court to solve authorized cases. 2. To research our network strength, and to fill the security hole with patches and fixes. 3. To get well deleted files or any recordsdata within the occasion of hardware or software failure

In computer forensics, an important things that have to be remembered when conducting the investigation are:

1. The original proof should not be altered in anyhow, and to do conduct the process, forensic investigator should make a bit-stream image. Bit-stream image is a little by little copy of the unique storage medium and precise copy of the original media. The difference between a bit-stream image and normal copy of the original storage is bit-stream image is the slack space in the storage. You'll not find any slack space info on a copy media.

2. All forensic processes must observe the legal legal guidelines in corresponding nation where the crimes happened. Each nation has different law suit in IT field. Some take IT guidelines very seriously, for example: United Kingdom, Australia.

3. All forensic processes can solely be carried out after the investigator has the search warrant.

Forensic investigators would normally looking on the timeline of how the crimes happened in timely manner. With that, we can produce the crime scene about how, when, what and why crimes may happened. In a giant company, it's urged to create a Digital Forensic Team or First Responder Group, in order that the corporate may still preserve the evidence till the forensic investigator come to the crime scene.

First Response rules are: 1. Not at all should anyone, with the exception of Forensic Analyst, to make any attempts to get well information from any computer system or gadget that holds digital information. 2. Any attempt to retrieve the data by person stated in number 1, must be avoided as it might compromise the integrity of the proof, by which turned inadmissible in authorized court.

Based on that guidelines, it has already explained the vital roles of having a First Responder Crew in a company. The unqualified particular person can only secure the perimeter in order that nobody can touch the crime scene till Forensic Analyst has come (This can be completed by taking photograph of the crime scene. They can also make notes about the scene and who have been present at that time.

Steps need to be taken when a digital crimes happenred in knowledgeable means: 1. Secure the crime scene till the forensic analyst arrive.

2. Forensic Analyst should request for the search warrant from local authorities or company's management.

3. Forensic Analyst make take an image of the crime scene in case of if there isn't any any photos has been taken.

4. If the computer continues to be powered on, do not turned off the computer. As an alternative, used a forensic instruments equivalent to Helix to get some data that can solely be discovered when the computer remains to be powered on, akin to data on RAM, and registries. Such tools has it's particular function as to not write anything back to the system so the integrity keep intake.

5. Once all live proof is collected, Forensic Analyst cant turned off the computer and take harddisk back to forensic lab.

6. All the evidences should be documented, by which chain of custody is used. Chain of Custody preserve information on the proof, corresponding to: who has the evidence for the final time.

7. Securing the evidence have to be accompanied by legal officer reminiscent of police as a formality.

8. Back within the lab, Forensic Analyst take the evidence to create bit-stream image, as unique evidence should not be used. Usually, Forensic Analyst will create 2-5 bit-stream image in case 1 image is corrupted. In fact Chain of Custody still used on this situation to keep data of the evidence.

9. Hash of the unique proof and bit-stream image is created. This acts as a proof that authentic proof and the bit-stream image is the exact copy. So any alteration on the bit image will result in totally different hash, which makes the evidences found turn out to be inadmissible in court.

10. Forensic Analyst starts to find evidence within the bit-stream image by carefully looking at the corresponding location is dependent upon what sort of crime has happened. For example: Temporary Internet Information, Slack Area, Deleted File, Steganography files.

Ignited byPink Amber Creative