StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

The Process of Gathering Forensic Evidence - Essay Example

Cite this document
Summary
The paper "The Process of Gathering Forensic Evidence" states that SANS tools are used in the extraction of data from local discs that are in a remote network. It can also be networked with another remote computer and used to obtain data from that remote computer…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93.3% of users find it useful
The Process of Gathering Forensic Evidence
Read Text Preview

Extract of sample "The Process of Gathering Forensic Evidence"

THE PROCESS OF GATHERING FORENSIC EVIDENCE College In a computer forensic investigation, there are basically six main stages that are followed in the investigation. The six stages are: 1. Consultancy This is the beginning of the investigation by consulting with clients and the crew that is involved in the forensic study. The whole team comes up with a way to collect, analyze and process data. This is necessary for all stakeholders to be able to know what to expect during the investigation. The main consultancy involves studying the place where the crime took place. In this stage, the experts have to also come up with the exact location of the evidence so that it can be collected. Coming up with the location is very important as it enables the crew to know where to collect the data. 2. Data preservation Electronic data is also fragile like any other type of data so any data that is to be preserved has to undergo a given protocol to make it safe. The expert should ensure that the data is not damaged and that computer virus does not affect the data. This can be done by storing data in a computer that is well protected from any virus and at the same time has a secure system that gives access to only stakeholders who can come up with the password. Data collection Once its location has been known the data has to be collected by the experts. They have to go to the virtually stored data get it and record it in the prepared storage device that had been preserved for its storage and that has minimum potential of destroying the data. When collecting the data various data collection tools are required to enable the process. Data recovery In this stage the data that had been collected is examined and the most important part of it is taken and is used. The other part of the data that was collected is also preserved for future reference. Computer forensic analysis This is the part where the experts sit down and examine the data that had been collected. This is the stage where they are able to know if the data has been tampered with after they have done all this then they have to give the go ahead for the writing of the report. Reports and testimonies This is the stage where the experts come up with the reports and their findings of the forensic evidence that they found. This can help support their clients in a court of law using their findings. Question 2 Yes there is a formal process of securing forensic data below is the characteristics 1. Preparation of the scene 2. Securing the scene 3. Recognition and surveying 4. Documentation of the scene 5. Shielding and communication 6. Collection of volatile evidence 7. Collection of non volatile evidence 8. Preservation 9. Examination 10. Presentation 11. Review Question 3 The laws that govern the collection of data include the following 1. Wiretap act 2. Pen/trap statute 3. Stored communication provisions of the electronic communication act Reference Doherty, E., & Liebesfeld, J. (2008). Proposing a Digital Forensics Grange. Security, 45(5), 32. Lillard, T. Carrier, B. D. (2006). Basic Digital Forensic Investigation Concepts. Retrieved, from the World Wide Web: http://www.digital-evidence.org/di_basics.html Richard-III, G. G., & Roussev, V. (2006). Next-Generation: Digital Forensics. Communications of the ACM, 49(2), 76-80 SANS investigation tools This is a computer hardware toolkit that is used in the performance of very detailed digital examination of forensic evidence. It is built using ubuntu software and is able to combine witness experience to come up with a witness format that is used in hand with advanced forensic format. The software’s that are used to make the device is sleuth kit which is a kit used to make file systems for analysis. The device has the capability of taking fingerprints through a touch screen and storing it in the computer memory. The use of SANS investigation tools This tool helps forensic experts to secure and examine raw data disks. It also has the capability of handling multiple file systems as well as come up with the format for the evidence that has been made. The tool also has the capability of placing strict deadlines to the data and how to work on it. In order to see all visible traffics, the tool is able to network to wirewash which has the ability to support promiscuous mode. The tool is networked to wirewash which has the ability to network, analyze and troubleshoot any problem that is available. The tool also has the capability of implementing its user interface to the required state. Advantages 1. It enables the investigators to get and access physical drives and memory of a computer that is remote on the network 2. It is very useful in cases of intrusions and places where data has been breached 3. It has the capability of a hard drive USB mini adapter 4. It can boot forensic distributions 5. Has the capability of protecting the data that has been collected. Drawbacks 1. It has minimal or no privacy concern on the computer user 2. It is very expensive to get the tool and few are able to afford it 3. It may also lead to data corruption and loss of data at the same time Application SANS tools is used in the extraction of data from local discs that are in a remote network. It can also be networked with another remote computer and used to obtain data from that remote computer. Truescan This is a computer hardware that constitutes frontline pitagora practical response to any printed document. This tool has the ability to scan and analyze passports, banknotes and ID cards within a very short time after only a click. This tool has a mouse like shape and one can easily pass it for a mouse. Use It scans various documents that is considered a security document and analyzes it within a click. It uses infrared radiation to scan the documents and come up with details and specifications of the person who had the documents. Advantages 1. The tool is able to firstly scan a document and reveal the holder of a certain document within a very short time 2. It is small and therefore convenient in travelling purposes to crime scenes 3. It has the capability of storing all the information that has been recorded 4. It has portable infrared light that enables it to be very convenient in the scanning process. Drawbacks 1. It is very expensive to own one of these device 2. The memory of this device is not large enough to hold a lot of data. Application It is used to make scan of documents to determine the holder of the documents. 4. Reference Doherty, E., & Liebesfeld, J. (2008). Proposing a Digital Forensics Grange. Security, 45(5), 32. Lillard, T. Carrier, B. D. (2006). Basic Digital Forensic Investigation Concepts. Retrieved, from the World Wide Web: http://www.digital-evidence.org/di_basics.html Richard-III, G. G., & Roussev, V. (2006). Next-Generation: Digital Forensics. Communications of the ACM, 49(2), 76-80 Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“The process of gathering forensic evidence Essay”, n.d.)
The process of gathering forensic evidence Essay. Retrieved from https://studentshare.org/information-technology/1587795-the-process-of-gathering-forensic-evidence
(The Process of Gathering Forensic Evidence Essay)
The Process of Gathering Forensic Evidence Essay. https://studentshare.org/information-technology/1587795-the-process-of-gathering-forensic-evidence.
“The Process of Gathering Forensic Evidence Essay”, n.d. https://studentshare.org/information-technology/1587795-the-process-of-gathering-forensic-evidence.
  • Cited: 1 times

CHECK THESE SAMPLES OF The Process of Gathering Forensic Evidence

Malware Forensic Computing

Forensics is the structured procedure of gathering, examining and showing facts and evidences to the court of law, and thus, forensic computing is defined as “the discipline that combines elements of law and computer science to collect and analyze data from computer systems, networks, wireless communications, and storage devices in a way that is admissible as evidence in a court of law” (US-CERT 2008).... This involves the seeking, locating and securing the electronic data so as to provide evidence....
10 Pages (2500 words) Assignment

Home Burglaries and Forensic Evidence

This paper examines the role of forensic evidence with regards to the crime of home burglaries.... Research on the role of forensic evidence in solving residential burglaries showed it has little or no impact at all on the actual criminal case outcomes.... Current judicial process and police investigative work does not give much weight to the use of forensic scientific methods in identifying suspects, making arrests, filing for the prosecution of the case and eventual conviction of the crime for the perpetrators....
4 Pages (1000 words) Term Paper

Reporting Forensic Evidence

uring the forensic investigation process, some of the things that were accomplished are the process of gathering the critical details of the potential suspects.... The paper "Reporting forensic evidence" highlights that the investigation procedures and tools utilized in the forensic investigation of any form of theft must be clear.... For instance, the investigators can employ the manual form of collecting forensic evidence or they can employ the computer technology method in the collection of forensic evidence....
4 Pages (1000 words) Research Paper

The RelationShip between Forensic Experts to Their Stakeholders

Due to the strong relationship made by the society and forensic science especially the citizens perceive forensic evidence as a much more trusted form of testimonial evidence than others do.... Studies have shown that prosecutors take forensic evidence as a central pillar of plea and trial conviction (Peterson & Murdock, 2009).... The stronger the forensic evidence the more likely the suspect to be fairly prosecuted according to the facts brought forward to the courtroom....
5 Pages (1250 words) Essay

Forensic Science in 21st Century Criminal Justice Paper

With the ng proliferation and improvement of modern forensics, law enforcement has been given an exact science as a tool that can produce exact and positive results in the process of crime investigation.... ?? Since forensic science is a marriage between the scientific methods of data gathering and analysis and the legal system, there are numerous protocols that are involved, especially the chain of command of handling evidence, which makes sure that the evidence is not tampered with at any point in the process of the investigation (Morgan, 2007 and Wolfe, 2001)....
4 Pages (1000 words) Essay

Computer Forensics: Admissibility of Evidence

This essay "Computer Forensics: Admissibility of evidence" examines the searching of personal gadgets and the use of DNA databases that has opened new avenues for investigators.... Whitcomb in his article, 'The Evolution of Digital evidence in Forensic Science Laboratories,' describes how computer forensics has grown over the last four decades.... Whitcomb shows how the FBI, in the early 1980s, adapted to this new form of evidence.... It was such a new idea that many local agencies used the FBI to process this evidence....
6 Pages (1500 words) Admission/Application Essay

The Collection of Digital Information

Computer forensics can be defined as the application of different computer tools in the collection of digital information which can serve as evidence in a court of law (Vacca, 2005, p.... Computer forensics can be defined as the application of different computer tools in the collection of digital information which can serve as evidence in a court of law (Vacca, 2005, p.... There have been increased cases of computer crimes, which results from poor computer security systems of poor evidence gathering in these organizations....
12 Pages (3000 words) Coursework

The Digital Forensic Process

well-documented process of conducting the digital examinations offers real-time guidelines that help to uncover information both from internal and external sources that otherwise could be unnoticed.... The objective of the paper also seeks to incorporate best practices in the judicial field about published processes such as The Scientific Working Group for Digital evidence (SWGDE.... RG) and other case laws on the digital evidence.... igital forensics is a set of tools, techniques, and methods utilized to collect, preserve and analyze digital data obtained from digital sources such as media, in an incident with the objective of extracting valid evidence to be presented to the court of law....
8 Pages (2000 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us