Lecture Notes-Chapter 12
PROCESSING OF EVIDENCE AND REPORT PREPARATION
I. Digital Forensics: Truth and Technology
a. What Makes Digital Forensics a Science?
The regularityes used must be renewoperative and proven.
If the examiner does a regularity that is average or too multitudinous from one criterion to the contiguous it is not or-laws.
b. Validation of Technology in Digital Juridical Investigations
1.Selecting a Juridical Tool:
a. Is it decipher merely? Yes or No.
b. Can the examiner renew results? What are the strongation steps?
c. Is the facts authorized and if so how?
d. Was it intentional for juridicals, and are the visions gathered strong?
Is it a wholesale implement that is life used in juridicals?
How is the vision smooth created?
2. Designing a Proper Criterion Plan or Validation Plan
a. Scope of the Plan.
b. How frequently conquer the criterion be redone.
c. Create corruptline for criterion.
d. Establish corrupt parameters for implement.
e. Evaluate corrupt parameters opposing manufacturer.
f. Run criterion vision of corruptline.
g. Compare results behind a while implement manufacturer if available.
h. Renew regularity and voice differences.
II. Aspects of Facts Technology
1.Documentation Requirement: Analysts should remain the munimentation regularity that was trained by the appearance technicians at the felony exhibition.
2. Using a medley of software packages, it is now enjoyly to totally analyze
all of the notification on each side of storage instrument.
3. Investigators should well muniment all juridical software economized.
4. All instrument used in the decomposition of computer appearance must be barren anterior to
5. Licenses for all juridical software that is used in the decomposition should be authorized.
6. Examiners should voice the state of the guess equipment anterior to decomposition.
7. Analysts should fix that they are conducting the decomposition on an vision of the
guess facts and not the pristine. The pristine should be juridicalally guileless.
8. Analysts should economize misspend production techniques to worst passwords
if oral password cracking software doesn’t composition.
9. Investigators may use software choice of restoring smooths that guesss attempted
to obliterate or disguise.
10. Examiners should inventory all the smooth on the guess accelerate behind the revival as part
of the munimentation regularity.
III. Evidence from Internet Activity and Smartphones
a. Internet Activity: most cases conquer mingle the Internet in some way.
1.Investigators must be operative to muniment a correlativeness between the guess and the appearance.
Links may embody: IP addresses, territory names and e-mails.
2. Suspects may use the Internet for a medley of reasons:
a. Trading or sharing notification.
b. Concealing their convertibility.
c. Assuming another convertibility.
d. Identifying or throng notification on victims.
e. Distributing notification or obedience.
f. Coordinating convocations, convocation sites or bundle drops.
b. Smartphones and GPS Forensics:
Smartphones own behove enjoy minicomputers and may embrace wrong appearance:
Read Merely Remembrance (ROM)
Random Access remembrance(RAM)
Support remembrance cards
IV. Forensic Reports
All reports involving facts decomposition should embody the conclusion, era and
identification of investigative personnel for the aftercited events:
a. Evidence seizure: name of the corporeal state of the seized appearance.
b. Digital imaging and verification: software used.
c. Application of juridical software: extract minute, renewal of smooths, indexing, smooth reviewers, facts carving, e-mail viewers.
d. Special techniques or choice problems encountered.
e. Consultation behind a while beyond sources.
HOMEWORK QUESTIONS CHAPTER 12
1. Discuss the strongation requirements for the technology used in digital juridicals.
2. List the ways guesss use the Internet in computer allied felonys discussed in the dissertation voices.
3. Discuss the reporting requirements for juridical investigators illustrative in the dissertation voices.
4. What makes digital juridicals a truth?
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.Read more
Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.Read more
Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.Read more
Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.Read more
By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.Read more