01 - Computer Forensics Fundamentals
01 - Computer Forensics Fundamentals
Recovering deleted files such as documents, graphics, and photos. Searching unallocated space on the hard drive, places where an abundance of data often resides. Tracing artifacts, those tidbits of data left behind by the operating system. Our experts know how to find these artifacts and, more importantly, they know how to evaluate the value of the information they find. Processing hidden files files that are not visible or accessible to the user that contain past usage information. Often, this process requires reconstructing and analyzing the date codes for each file and determining when each file was created, last modified, last accessed and when deleted. Running a string-search for e-mail, when no e-mail client is obvious.
COMPUTER FORENSICS
UNIT I PART I
COMPUTER FORENSICS
UNIT I PART I
1. DATA SEIZURE
Following federal guidelines, computer forensics experts should act as the representative, using their knowledge of data storage technologies to track down evidence. The experts should also be able to assist officials during the equipment seizure process.
2. DATA DUPLICATION/PRESERVATION
When one party must seize data from another, two concerns must be addressed: o o the data must not be altered in any way the seizure must not put an undue burden on the responding party
The computer forensics experts should acknowledge both of these concerns by making an exact duplicate of the needed data. When experts works on the duplicate data, the integrity of the original is maintained.
3. DATA RECOVERY
Using proprietary tools, your computer forensics experts should be able to safely recover and analyze otherwise inaccessible evidence. The ability to recover lost evidence is made possible by the experts advanced understanding of storage technologies.
4. DOCUMENT SEARCHES
Computer forensics experts should also be able to search over 200,000 electronic documents in seconds rather than hours. The speed and efficiency of these searches make the discovery process less complicated and less intrusive to all parties involved.
COMPUTER FORENSICS
UNIT I PART I
5. MEDIA CONVERSION
Computer forensics experts should extract the relevant data from old and un-readable devices, convert it into readable formats, and place it onto new storage media for analysis.
COMPUTER FORENSICS
UNIT I PART I
No possible evidence is damaged, destroyed, or otherwise compromised by the procedures used to investigate the computer.
2. 3.
No possible computer virus is introduced to a subject computer during the analysis process. Extracted and possibly relevant evidence is properly handled and protected from later mechanical or electromagnetic damage.
4. 5. 6.
A continuing chain of custody is established and maintained. Business operations are affected for a limited amount of time, if at all. Any client-attorney information that is inadvertently acquired during a forensic exploration is ethically and legally respected and not divulged.
COMPUTER FORENSICS
UNIT I PART I
Source:
6
Send your feedback to [email protected]