Contact Us
Sign In / Sign Up for FREE
Go to advanced search...
Nobody downloaded yet

Digital Forensic Investigation - Report Example

Comments (0) Cite this document
Thie report "Digital Forensic Investigation" details the examination of a USB Key drive image for evidence of Espionage. It gives details of the forensic procedure used as well as the results of the investigation. This report is true to the investigator's knowledge and belief…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER92.4% of users find it useful
Digital Forensic Investigation
Read TextPreview

Extract of sample "Digital Forensic Investigation"

Download file to see previous pages The identification features are permanently associated with the given artifact and this gives it a unique tag. This specific designation gives room for positive identification of the evidence. The unique identification is in line with the core requirement of a verifiable procedure of custody. The handover process is well documented in the evidence custody journal and safely secured to ensure integrity is maintained.
Autopsy Forensic is a commonly used open-source forensic tool. It is a graphical digital forensics platform hosting the Sleuth Kit as well as other digital forensics tools. Normally it’s utilized by government law enforcement institutions such as the police, national defense, and private examiners in the investigation of digital devices. It is used to recover erased contents of file systems as well as conducting keyword searches.
CAINE (Computer Aided Investigative Environment) is an integrated digital forensics environment based on Ubuntu-based GNU/Linux live distribution offering a complete forensic environment with a user-friendly graphical interface and a semi-automated report generating feature.
Once the investigator received the USB image, the preservation of its original state was attained and recorded. The main reason to preserve the image is to maintain its integrity as it is prone to tampering and alteration in the succeeding forensic analysis phases. Immediately the image integrity is established the subsequent analysis is conducted on copies. This gives a way of comparing the copy with the original at any phase. As a result, the copies are verified to be authentic and have not been altered in any way thereby relevant and reliable.
The initial step in analyzing the image is to find the number and kind of partitions the image holds and is achieved by running both the fdisk and MLS controls on the image. Then the partitions are segregated for analysis using the dd command. ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
(Digital Forensic Investigation Report Example | Topics and Well Written Essays - 1500 words, n.d.)
Digital Forensic Investigation Report Example | Topics and Well Written Essays - 1500 words.
(Digital Forensic Investigation Report Example | Topics and Well Written Essays - 1500 Words)
Digital Forensic Investigation Report Example | Topics and Well Written Essays - 1500 Words.
“Digital Forensic Investigation Report Example | Topics and Well Written Essays - 1500 Words”.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Digital Forensic Investigation

Forensic investigation

...Digital Forensic Investigation... Digital Forensic Investigation... Currently, the number of crimes committed has been increasing with the technology applied continuously advancing. This has raised concerns among various stakeholders. Forensic investigation has been playing a significant role in identifying the criminals. This is achieved by the use of a well-defined strategies and equipped laboratories. Computer Forensic Process: a guideline for best practices is sequence of steps or set of procedures, which plays a very important part in supporting the forensic examiner to protect the digital evidence. By protecting the evidences, the examiner builds a strong case and avoids dismissal of the case in the court. This paper focuses on creating a...
13 Pages(3250 words)Essay

Forensic Accounting Investigation

...Digital Forensic Investigation... Digital Forensic Investigation... Intelligence 1 Introduction: Business intelligence is a computer based technique, used to analyze and identify the business data regarding sales and income, by product or by department. It also helps to determine various income and expenses associated to the business. Business intelligence system helps the organization to make better decisions in the organization and hence it is also known as decision support system. “Business intelligence (BI) is a broad category of applications and technologies for gathering, storing, analyzing, and providing access to data to help enterprise users make better business decisions” (Definition: Business Intelligence (BI) 2005, para. 1). 1.2 Why...
4 Pages(1000 words)Research Paper

Digital Forensic Laboratory

...Digital Forensic Investigation... Digital Forensic Investigation... Digital Forensic Laboratory Affiliation Digital Forensic Laboratory Digital forensics currently is among the most essential and fastest growing sections of crime laboratories and general investigations. Over the year’s advancement in research and technology have made it possible for even the slightest details to be captured which could lead to major breakthroughs in the investigation. In this regard, most laboratories without a digital forensic unit are either becoming obsolete or creating space and remodeling existing spaces to create the digital unit. Digital forensics can be defined as the forensic investigation of electronic devices capable of storing data or information in...
3 Pages(750 words)Assignment

Digital Forensic Investigation

...?Running Head: Digital Forensic Investigation Digital Forensic Investigation [Institute’s DIGITAL FORENSIC INVESTIGATION Table of Contents Table of Contents 2 INTRODUCTION 3 SOURCES OF DATA 4 General Logs 5 Time Packages 6 System Files 8 POTENTIAL USEFULNESS 9 CONCLUSION 9 REFERENCES 10 INTRODUCTION Primarily, this paper will discuss different sources of data that are used during investigation of digital forensics in an effective and legal way, will look at basic technical issues, and will endeavor to indicate references for further reading. In addition, the paper will also prioritize discussed data sources according to three different events of network intrusion, malware installation, and insider file detection. Discussion will be very...
8 Pages(2000 words)Case Study

Digital investigation in the organization

... digital evidence before an incident occurs and not after the incident has occurred(Robert, 2004). The digital investigation for law enforcement yields digital evidence, the evidence however may involve the use of enhanced system and staff monitoring, physical and procedural ways of securing data to a standard to be accepted as evidence and considered admissible. It also involves technical and appropriate legal advice to staff and employees(Peter, 2003). The law enforcement perspective of the digital forensic investigation tends to disregard what happens to the object or device before the decision is made whether to be accepted as evidence or not. In this context the evidence required is presented by the digital forensic investigation...
5 Pages(1250 words)Essay

Essential of forensic investigation

...Digital Forensic Investigation... Digital Forensic Investigation... of Forensic Investigation Essentials of Forensic Investigation Executive Summary Forensic science is inseparable from crime investigationnow. It is one of the compulsory tools which crime investigators use to examine crime evidence. The paper is studies a case which was tried twice on the basis of evidence of forensic investigations. There are various evidences and tools used by forensic science in their investigations. Some of them are fingerprints, evidence and trace examination, genetic fingerprints, ballistics and tool markings, blood evidence, forensic chemistry, autopsies, document examination, arson investigation, etc. A proper fusion of molecular biology, chemistry and...
20 Pages(5000 words)Case Study

Digital forensic investigation

...Digital Forensic Investigation... Digital Forensic Investigation... Forensic Investigation No. - IN THE of court] COURT BETWEEN CLAIMANT of Claimant) and DEFENDANT of Defendant) ______________________ [DRAFT] REPORT Regarding XYZ ______________________ Digital Forensics Investigations Introduction Digital forensics is a branch of the forensics department which mainly focuses on the recovery of digital information, from various sources such as in the hard drive of a computer. The main focus area of digital forensics is in the cyber crimes that are committed on frequents basis recently. The investigators use various techniques to recover the data which would be necessary to catch the parties which are involved at that particular moment (Kipper, 20...
20 Pages(5000 words)Essay

Forensic Investigation Handbook

...Digital Forensic Investigation... 1: There are several reasons for taking photography for a dead body in the crime scene. The first it to act as an exhibit for the crime committed, the second is to ensure the real crime content is presented as original and third the facial photograph is send for image recognition of the victim. List 2: Trace evidence are things like ID, bank ATM card, Phones among other national documents including drugs such as cigarette among other things that the victim had in the pocket or posed at the time of death. This is used to gather personal details of the victim including residence location and relatives if any (Karagiozis & Sgaglio, 2005). List 3: Other evidences include things used by the suspect such as kn...
1 Pages(250 words)Assignment

Obama Care

5 Pages(1250 words)Essay

Digital Forensic

...Digital Forensic Investigation... Digital Forensic Investigation... Forensic Question One Using write-blocker to examine forensic data Concerning the digital forensics, there is need to use write-blockers to create forensic images of the media. The practice is indeed ingrained to the extent that the images created minus write-blocker are easy to suspect. Notably, an individual can use a Windows registry in an attempt to write protect devices such as USB mass storage. An investigator combines a USB-SATA adapter or USB-IDE device with USB write-blocking tricks to offer device protection. Examining forensic data using write-blocker involves a critical NCFS 5-step validation process to test the write protection device. Firstly, an investigator needs t...
20 Pages(5000 words)Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Report on topic Digital Forensic Investigation for FREE!

Contact Us