SlideShare une entreprise Scribd logo
1  sur  9
By Vidoushi D. Bahadur-Somrah
Digital Forensics

 Digital forensics is the science of identifying evidence from digital sources
  and which provides the forensic experts with robust tools and techniques to
  solve complicated digital-related crimes (Carrier, B., 2002).
 There are 2 compulsory criteria prior to the admission in court: (1) relevant
  to the case and (2) must use scientific methods and procedures.
 Due to lack of care in gathering evidence can result to not only as
  meaningless evidences but heavy penalties to forensics expert team such as
  charges in terms of civil rights and falsifying allegations based on no factual
  evidence.
Process of digital forensics:




               Fig 1: Process of digital forensics (Dr J.
                         Haggerty, no date)
The process of computer forensics during
investigation (Dr J. Haggerty, no date) :
                                                          Starts here
                                                           Starts here
    Preservation


                                                                        Identify tools & methods
            Identification


                                                                              Use tools & methods
                             Extraction



                                          Documentation


                                                                                                    Ends here
                                                                                                         Ends   here
                                                             Interpretation




                                           Fig 2: Process of Computer forensics
Examples of scientific detection tools
available to detect hidden data :




Fig 3: WetStone Technologies’ Gargoyle (Kessler, G. C., 2004)   Fig 4: Niels Provos’s stegdetect (Niels Provos, 2004)
How to check the reliability of the
data found?
 Digital evidence has a requirement to undergo a ‘Daubert’ hearing by law
  prior to being formally presented in court. In this a pre-trial session, the
  judge decides whether the tools and methods used to collect, analyse and
  retrieve the digital evidence is viable and can be presented in court
  (Carrier, B., 2002).

 The Daubert guidelines involve 4 stages (Carrier, B., 2002):

        Testing          Error rate                Publication             Acceptance



                               Fig 5: Daubert accuracy guidelines stages
Professional, ethical and legal issues
As computer forensics consists of a series of complex phases, evidence need to
be carefully gathered and securely stored for investigation. During this
process, integrity of information obtained should not be compromise or altered
at any cost.
1. Professional – The investigator plays an essential and effective role during
   this investigation. Any mistake from their part will lose all the validity and
   relevancy to the case as well as will reject by the Daubert hearing (Digital
   Forensics Magazine, 2010).
2. Ethical - a collection of guided moral principles for the usage of computers
   & issues of computer forensics faces are privacy concerns, how computers
   affect society etc (Digital Forensics Magazine, 2010).
3. Legal - As technologies are evolving at a high speed & now can find small
   and yet powerful computers or devices which pose several legal standard
   challenges for forensics experts in identifying & extracting information.
References:
 Fig 1: Dr J. Haggerty, no date. Digital forensics: Digital forensic process. Available
  at: http://www.cse.salford.ac.uk/profiles/haggerty/forensics.php [Accessed on
  16/10/2011]. Fig 3: Kessler, G. C., 2004. WetStone Technologies’ Gargoyle.
  Available at:
  <http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.90.8113&rep=rep1&typ
  e=pdf > [Accessed on 16/10/2011].
 Fig 4: Niels Provos, 2004. Niels Provos’s stegdetect. Available at:
  <http://www.outguess.org/detection.php > [Accessed on 17/10/2011].
 Carrier, B. (2002). Open Source Digital Forensics Tools. Citeseerx[Online paper].
  Available at: : <http://www.digital-
  evidence.org/papers/opensrc_legal.pdf>[Accessed on 16/10/2011]. Daniel J.R and
  G. Shpantzer (2005). Legal Aspects of Digital Forensics. Available at:
  http://euro.ecom.cmu.edu/program/law/08-732/Evidence/RyanShpantzer.pdf>
  [Accessed on 17/10/2011]. Dr J. Haggerty(no date). Digital forensics. Available at:
  http://www.cse.salford.ac.uk/profiles/haggerty/forensics.php [Accessed on
  16/10/2011]. Digital Forensics Magazine(2010). Ethics in Computer Forensics.
  Available at:
  <http://www.digitalforensicsmagazine.com/index.php?option=com_content&view=a
  rticle&id=540> [accessed on 17/10/2011].
Any Questions?

Contenu connexe

Tendances

A brief Intro to Digital Forensics
A brief Intro to Digital ForensicsA brief Intro to Digital Forensics
A brief Intro to Digital ForensicsManik Bhola
 
Digital Evidence by Raghu Khimani
Digital Evidence by Raghu KhimaniDigital Evidence by Raghu Khimani
Digital Evidence by Raghu KhimaniDr Raghu Khimani
 
Introduction to computer forensic
Introduction to computer forensicIntroduction to computer forensic
Introduction to computer forensicOnline
 
Digital Forensics
Digital ForensicsDigital Forensics
Digital ForensicsOldsun
 
Processing Crimes and Incident Scenes
Processing Crimes and Incident ScenesProcessing Crimes and Incident Scenes
Processing Crimes and Incident Scenesprimeteacher32
 
Digital forensics Steps
Digital forensics StepsDigital forensics Steps
Digital forensics Stepsgamemaker762
 
Brief introduction to digital forensics
Brief introduction to digital forensicsBrief introduction to digital forensics
Brief introduction to digital forensicsMarco Alamanni
 
Computer forensic ppt
Computer forensic pptComputer forensic ppt
Computer forensic pptPriya Manik
 
Digital Forensics best practices with the use of open source tools and admiss...
Digital Forensics best practices with the use of open source tools and admiss...Digital Forensics best practices with the use of open source tools and admiss...
Digital Forensics best practices with the use of open source tools and admiss...Sagar Rahurkar
 
Digital forensic principles and procedure
Digital forensic principles and procedureDigital forensic principles and procedure
Digital forensic principles and procedurenewbie2019
 

Tendances (20)

Data recovery
Data recoveryData recovery
Data recovery
 
Current Forensic Tools
Current Forensic Tools Current Forensic Tools
Current Forensic Tools
 
A brief Intro to Digital Forensics
A brief Intro to Digital ForensicsA brief Intro to Digital Forensics
A brief Intro to Digital Forensics
 
Digital Evidence by Raghu Khimani
Digital Evidence by Raghu KhimaniDigital Evidence by Raghu Khimani
Digital Evidence by Raghu Khimani
 
Digital Forensic
Digital ForensicDigital Forensic
Digital Forensic
 
Introduction to computer forensic
Introduction to computer forensicIntroduction to computer forensic
Introduction to computer forensic
 
Digital Forensics
Digital ForensicsDigital Forensics
Digital Forensics
 
Processing Crimes and Incident Scenes
Processing Crimes and Incident ScenesProcessing Crimes and Incident Scenes
Processing Crimes and Incident Scenes
 
Digital forensics Steps
Digital forensics StepsDigital forensics Steps
Digital forensics Steps
 
Cyber Forensics Module 2
Cyber Forensics Module 2Cyber Forensics Module 2
Cyber Forensics Module 2
 
Digital Forensics
Digital ForensicsDigital Forensics
Digital Forensics
 
Data Acquisition
Data AcquisitionData Acquisition
Data Acquisition
 
Mobile forensic
Mobile forensicMobile forensic
Mobile forensic
 
Brief introduction to digital forensics
Brief introduction to digital forensicsBrief introduction to digital forensics
Brief introduction to digital forensics
 
Mobile Forensics
Mobile ForensicsMobile Forensics
Mobile Forensics
 
Computer forensic ppt
Computer forensic pptComputer forensic ppt
Computer forensic ppt
 
Autopsy Digital forensics tool
Autopsy Digital forensics toolAutopsy Digital forensics tool
Autopsy Digital forensics tool
 
The Scope of Cyber Forensic.pptx
The Scope of Cyber Forensic.pptxThe Scope of Cyber Forensic.pptx
The Scope of Cyber Forensic.pptx
 
Digital Forensics best practices with the use of open source tools and admiss...
Digital Forensics best practices with the use of open source tools and admiss...Digital Forensics best practices with the use of open source tools and admiss...
Digital Forensics best practices with the use of open source tools and admiss...
 
Digital forensic principles and procedure
Digital forensic principles and procedureDigital forensic principles and procedure
Digital forensic principles and procedure
 

En vedette

Chapter 3 cmp forensic
Chapter 3 cmp forensicChapter 3 cmp forensic
Chapter 3 cmp forensicshahhardik27
 
Watching the Detectives: Using digital forensics techniques to investigate th...
Watching the Detectives: Using digital forensics techniques to investigate th...Watching the Detectives: Using digital forensics techniques to investigate th...
Watching the Detectives: Using digital forensics techniques to investigate th...GarethKnight
 
Chfi V3 Module 01 Computer Forensics In Todays World
Chfi V3 Module 01 Computer Forensics In Todays WorldChfi V3 Module 01 Computer Forensics In Todays World
Chfi V3 Module 01 Computer Forensics In Todays Worldgueste0d962
 
Cyberwar poster english
Cyberwar poster englishCyberwar poster english
Cyberwar poster englishAbbas Badran
 
Legal aspects of handling cyber frauds
Legal aspects of handling cyber fraudsLegal aspects of handling cyber frauds
Legal aspects of handling cyber fraudsSagar Rahurkar
 
02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - Notes02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - NotesKranthi
 
Computer +forensics
Computer +forensicsComputer +forensics
Computer +forensicsRahul Baghla
 

En vedette (9)

Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
Chapter 3 cmp forensic
Chapter 3 cmp forensicChapter 3 cmp forensic
Chapter 3 cmp forensic
 
Watching the Detectives: Using digital forensics techniques to investigate th...
Watching the Detectives: Using digital forensics techniques to investigate th...Watching the Detectives: Using digital forensics techniques to investigate th...
Watching the Detectives: Using digital forensics techniques to investigate th...
 
computer forensics
computer forensicscomputer forensics
computer forensics
 
Chfi V3 Module 01 Computer Forensics In Todays World
Chfi V3 Module 01 Computer Forensics In Todays WorldChfi V3 Module 01 Computer Forensics In Todays World
Chfi V3 Module 01 Computer Forensics In Todays World
 
Cyberwar poster english
Cyberwar poster englishCyberwar poster english
Cyberwar poster english
 
Legal aspects of handling cyber frauds
Legal aspects of handling cyber fraudsLegal aspects of handling cyber frauds
Legal aspects of handling cyber frauds
 
02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - Notes02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - Notes
 
Computer +forensics
Computer +forensicsComputer +forensics
Computer +forensics
 

Similaire à Digital Forensics Process

Systematic Digital Forensic Investigation Model
Systematic Digital Forensic Investigation ModelSystematic Digital Forensic Investigation Model
Systematic Digital Forensic Investigation ModelCSCJournals
 
Network and computer forensics
Network and computer forensicsNetwork and computer forensics
Network and computer forensicsJohnson Ubah
 
Applying Data Mining Principles in the Extraction of Digital Evidence
Applying Data Mining Principles in the Extraction of Digital EvidenceApplying Data Mining Principles in the Extraction of Digital Evidence
Applying Data Mining Principles in the Extraction of Digital EvidenceDr. Richard Otieno
 
What is Digital Forensics.docx
What is Digital Forensics.docxWhat is Digital Forensics.docx
What is Digital Forensics.docxAliAshraf68199
 
Anti-Forensic Techniques and Its Impact on Digital Forensic
Anti-Forensic Techniques and Its Impact on Digital ForensicAnti-Forensic Techniques and Its Impact on Digital Forensic
Anti-Forensic Techniques and Its Impact on Digital ForensicIRJET Journal
 
FORENSIC COMPUTING MODELS: TECHNICAL OVERVIEW
FORENSIC COMPUTING MODELS: TECHNICAL OVERVIEWFORENSIC COMPUTING MODELS: TECHNICAL OVERVIEW
FORENSIC COMPUTING MODELS: TECHNICAL OVERVIEWcscpconf
 
cyber law and forensics,biometrics systems
cyber law and forensics,biometrics systemscyber law and forensics,biometrics systems
cyber law and forensics,biometrics systemsMayank Diwakar
 
Design for A Network Centric Enterprise Forensic System
Design for A Network Centric Enterprise Forensic SystemDesign for A Network Centric Enterprise Forensic System
Design for A Network Centric Enterprise Forensic SystemCSCJournals
 
1- How could you approach a task to create a stakeholder’s managem.docx
1- How could you approach a task to create a stakeholder’s managem.docx1- How could you approach a task to create a stakeholder’s managem.docx
1- How could you approach a task to create a stakeholder’s managem.docxaulasnilda
 
5 Key Steps Involved In Digital Forensic Science
5 Key Steps Involved In Digital Forensic Science5 Key Steps Involved In Digital Forensic Science
5 Key Steps Involved In Digital Forensic ScienceICFECI
 
Computer Forensics MethodologiesList them and explain each one.P.pdf
Computer Forensics MethodologiesList them and explain each one.P.pdfComputer Forensics MethodologiesList them and explain each one.P.pdf
Computer Forensics MethodologiesList them and explain each one.P.pdffeetshoemart
 
2022-05-12 Live Forensics for Law Enforcement @UniPD
2022-05-12 Live Forensics for Law Enforcement @UniPD2022-05-12 Live Forensics for Law Enforcement @UniPD
2022-05-12 Live Forensics for Law Enforcement @UniPDDavide Gabrini
 
iConference Popovsky
iConference PopovskyiConference Popovsky
iConference PopovskyBrian Rowe
 
Predict Conference: Data Analytics for Digital Forensics and Cybersecurity
Predict Conference: Data Analytics for Digital Forensics and CybersecurityPredict Conference: Data Analytics for Digital Forensics and Cybersecurity
Predict Conference: Data Analytics for Digital Forensics and CybersecurityMark Scanlon
 

Similaire à Digital Forensics Process (20)

Systematic Digital Forensic Investigation Model
Systematic Digital Forensic Investigation ModelSystematic Digital Forensic Investigation Model
Systematic Digital Forensic Investigation Model
 
Network and computer forensics
Network and computer forensicsNetwork and computer forensics
Network and computer forensics
 
Applying Data Mining Principles in the Extraction of Digital Evidence
Applying Data Mining Principles in the Extraction of Digital EvidenceApplying Data Mining Principles in the Extraction of Digital Evidence
Applying Data Mining Principles in the Extraction of Digital Evidence
 
What is Digital Forensics.docx
What is Digital Forensics.docxWhat is Digital Forensics.docx
What is Digital Forensics.docx
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
Anti-Forensic Techniques and Its Impact on Digital Forensic
Anti-Forensic Techniques and Its Impact on Digital ForensicAnti-Forensic Techniques and Its Impact on Digital Forensic
Anti-Forensic Techniques and Its Impact on Digital Forensic
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
Digital forensics.abdallah
Digital forensics.abdallahDigital forensics.abdallah
Digital forensics.abdallah
 
FORENSIC COMPUTING MODELS: TECHNICAL OVERVIEW
FORENSIC COMPUTING MODELS: TECHNICAL OVERVIEWFORENSIC COMPUTING MODELS: TECHNICAL OVERVIEW
FORENSIC COMPUTING MODELS: TECHNICAL OVERVIEW
 
cyber law and forensics,biometrics systems
cyber law and forensics,biometrics systemscyber law and forensics,biometrics systems
cyber law and forensics,biometrics systems
 
Computer Forensics.pptx
Computer Forensics.pptxComputer Forensics.pptx
Computer Forensics.pptx
 
Design for A Network Centric Enterprise Forensic System
Design for A Network Centric Enterprise Forensic SystemDesign for A Network Centric Enterprise Forensic System
Design for A Network Centric Enterprise Forensic System
 
1- How could you approach a task to create a stakeholder’s managem.docx
1- How could you approach a task to create a stakeholder’s managem.docx1- How could you approach a task to create a stakeholder’s managem.docx
1- How could you approach a task to create a stakeholder’s managem.docx
 
5 Key Steps Involved In Digital Forensic Science
5 Key Steps Involved In Digital Forensic Science5 Key Steps Involved In Digital Forensic Science
5 Key Steps Involved In Digital Forensic Science
 
Computer Forensics MethodologiesList them and explain each one.P.pdf
Computer Forensics MethodologiesList them and explain each one.P.pdfComputer Forensics MethodologiesList them and explain each one.P.pdf
Computer Forensics MethodologiesList them and explain each one.P.pdf
 
2022-05-12 Live Forensics for Law Enforcement @UniPD
2022-05-12 Live Forensics for Law Enforcement @UniPD2022-05-12 Live Forensics for Law Enforcement @UniPD
2022-05-12 Live Forensics for Law Enforcement @UniPD
 
180 184
180 184180 184
180 184
 
3170725_Unit-1.pptx
3170725_Unit-1.pptx3170725_Unit-1.pptx
3170725_Unit-1.pptx
 
iConference Popovsky
iConference PopovskyiConference Popovsky
iConference Popovsky
 
Predict Conference: Data Analytics for Digital Forensics and Cybersecurity
Predict Conference: Data Analytics for Digital Forensics and CybersecurityPredict Conference: Data Analytics for Digital Forensics and Cybersecurity
Predict Conference: Data Analytics for Digital Forensics and Cybersecurity
 

Dernier

4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxBIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxSayali Powar
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Projectjordimapav
 
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Association for Project Management
 
How to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 DatabaseHow to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 DatabaseCeline George
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
 
MS4 level being good citizen -imperative- (1) (1).pdf
MS4 level   being good citizen -imperative- (1) (1).pdfMS4 level   being good citizen -imperative- (1) (1).pdf
MS4 level being good citizen -imperative- (1) (1).pdfMr Bounab Samir
 
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptxMan or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptxDhatriParmar
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxlancelewisportillo
 
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDecoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDhatriParmar
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
Congestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationCongestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationdeepaannamalai16
 
Mythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWMythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWQuiz Club NITW
 
Using Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea DevelopmentUsing Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea Developmentchesterberbo7
 
How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17Celine George
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 

Dernier (20)

4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxBIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Project
 
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptxINCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
 
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
 
How to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 DatabaseHow to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 Database
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
 
MS4 level being good citizen -imperative- (1) (1).pdf
MS4 level   being good citizen -imperative- (1) (1).pdfMS4 level   being good citizen -imperative- (1) (1).pdf
MS4 level being good citizen -imperative- (1) (1).pdf
 
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptxMan or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
 
prashanth updated resume 2024 for Teaching Profession
prashanth updated resume 2024 for Teaching Professionprashanth updated resume 2024 for Teaching Profession
prashanth updated resume 2024 for Teaching Profession
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
 
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDecoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
Congestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationCongestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentation
 
Mythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWMythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITW
 
Using Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea DevelopmentUsing Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea Development
 
How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 

Digital Forensics Process

  • 1. By Vidoushi D. Bahadur-Somrah
  • 2. Digital Forensics  Digital forensics is the science of identifying evidence from digital sources and which provides the forensic experts with robust tools and techniques to solve complicated digital-related crimes (Carrier, B., 2002).  There are 2 compulsory criteria prior to the admission in court: (1) relevant to the case and (2) must use scientific methods and procedures.  Due to lack of care in gathering evidence can result to not only as meaningless evidences but heavy penalties to forensics expert team such as charges in terms of civil rights and falsifying allegations based on no factual evidence.
  • 3. Process of digital forensics: Fig 1: Process of digital forensics (Dr J. Haggerty, no date)
  • 4. The process of computer forensics during investigation (Dr J. Haggerty, no date) : Starts here Starts here Preservation Identify tools & methods Identification Use tools & methods Extraction Documentation Ends here Ends here Interpretation Fig 2: Process of Computer forensics
  • 5. Examples of scientific detection tools available to detect hidden data : Fig 3: WetStone Technologies’ Gargoyle (Kessler, G. C., 2004) Fig 4: Niels Provos’s stegdetect (Niels Provos, 2004)
  • 6. How to check the reliability of the data found?  Digital evidence has a requirement to undergo a ‘Daubert’ hearing by law prior to being formally presented in court. In this a pre-trial session, the judge decides whether the tools and methods used to collect, analyse and retrieve the digital evidence is viable and can be presented in court (Carrier, B., 2002).  The Daubert guidelines involve 4 stages (Carrier, B., 2002): Testing Error rate Publication Acceptance Fig 5: Daubert accuracy guidelines stages
  • 7. Professional, ethical and legal issues As computer forensics consists of a series of complex phases, evidence need to be carefully gathered and securely stored for investigation. During this process, integrity of information obtained should not be compromise or altered at any cost. 1. Professional – The investigator plays an essential and effective role during this investigation. Any mistake from their part will lose all the validity and relevancy to the case as well as will reject by the Daubert hearing (Digital Forensics Magazine, 2010). 2. Ethical - a collection of guided moral principles for the usage of computers & issues of computer forensics faces are privacy concerns, how computers affect society etc (Digital Forensics Magazine, 2010). 3. Legal - As technologies are evolving at a high speed & now can find small and yet powerful computers or devices which pose several legal standard challenges for forensics experts in identifying & extracting information.
  • 8. References:  Fig 1: Dr J. Haggerty, no date. Digital forensics: Digital forensic process. Available at: http://www.cse.salford.ac.uk/profiles/haggerty/forensics.php [Accessed on 16/10/2011]. Fig 3: Kessler, G. C., 2004. WetStone Technologies’ Gargoyle. Available at: <http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.90.8113&rep=rep1&typ e=pdf > [Accessed on 16/10/2011].  Fig 4: Niels Provos, 2004. Niels Provos’s stegdetect. Available at: <http://www.outguess.org/detection.php > [Accessed on 17/10/2011].  Carrier, B. (2002). Open Source Digital Forensics Tools. Citeseerx[Online paper]. Available at: : <http://www.digital- evidence.org/papers/opensrc_legal.pdf>[Accessed on 16/10/2011]. Daniel J.R and G. Shpantzer (2005). Legal Aspects of Digital Forensics. Available at: http://euro.ecom.cmu.edu/program/law/08-732/Evidence/RyanShpantzer.pdf> [Accessed on 17/10/2011]. Dr J. Haggerty(no date). Digital forensics. Available at: http://www.cse.salford.ac.uk/profiles/haggerty/forensics.php [Accessed on 16/10/2011]. Digital Forensics Magazine(2010). Ethics in Computer Forensics. Available at: <http://www.digitalforensicsmagazine.com/index.php?option=com_content&view=a rticle&id=540> [accessed on 17/10/2011].