CF Unit No 1 2
CF Unit No 1 2
CF Unit No 1 2
Identification
This is the initial stage in which the individuals or devices to be analyzed are
identified as likely sources of significant evidence.
Preservation
It focuses on safeguarding relevant electronically stored information (ESI) by
capturing and preserving the crime scene, documenting relevant information
such as visual images, and how it was obtained.
Analysis
It is a methodical examination of the evidence of the information gathered.
This examination produces data objects, including system and user-generated
files, and seeks specific answers and points of departure for conclusions.
Documentation
These are tried-and-true procedures for documenting the analysis's
conclusions, and they must allow other competent examiners to read through
and duplicate the results.
Presentation
The collection of digital information, which may entail removing electronic
devices from the crime/incident scene and copying or printing the device(s), is
critical to the investigation.
Evidence Assessment
A key component of the investigative process involves the assessment of potential
evidence in a cyber crime. Central to the effective processing of evidence is a clear
understanding of the details of the case at hand and thus, the classification of cyber
crime in question. For instance, if an agency seeks to prove that an individual has
committed crimes related to identity theft, computer forensics investigators use
sophisticated methods to sift through hard drives, email accounts, social networking
sites, and other digital archives to retrieve and assess any information that can serve
as viable evidence of the crime. This is, of course, true for other crimes, such as
engaging in online criminal behavior like posting fake products on eBay or Craigslist
intended to lure victims into sharing credit card information. Prior to conducting an
investigation, the investigator must define the types of evidence sought (including
specific platforms and data formats) and have a clear understanding of how to
preserve pertinent data. The investigator must then determine the source and
integrity of such data before entering it into evidence.
Evidence Acquisition
Perhaps the most critical facet of successful computer forensic investigation is a
rigorous, detailed plan for acquiring evidence. Extensive documentation is needed
prior to, during, and after the acquisition process; detailed information must be
recorded and preserved, including all hardware and software specifications, any
systems used in the investigation process, and the systems being investigated. This
step is where policies related to preserving the integrity of potential evidence are
most applicable. General guidelines for preserving evidence include the physical
removal of storage devices, using controlled boot discs to retrieve sensitive data and
ensure functionality, and taking appropriate steps to copy and transfer evidence to
the investigator’s system.
Evidence Examination
In order to effectively investigate potential evidence, procedures must be in place for
retrieving, copying, and storing evidence within appropriate databases. Investigators
typically examine data from designated archives, using a variety of methods and
approaches to analyze information; these could include utilizing analysis software to
search massive archives of data for specific keywords or file types, as well as
procedures for retrieving files that have been recently deleted. Data tagged with
times and dates is particularly useful to investigators, as are suspicious files or
programs that have been encrypted or intentionally hidden.
Public Sector
The Public Sector consists of businesses that are owned and controlled by
the government of a country. The ownership and control of the central or
state governments in these organisations are either complete or partial.
But it still holds a majority stake and makes every single decision regarding
running the entity. These organisations include government agencies,
state-owned enterprises, municipalities, local government authorities and
other public service institutions.
Private Sector
The Private Sector enterprises are owned, controlled and managed either
by individuals or business entities. It can be small-scale, medium-scale or
even large-scale organisations. These get formed to earn a profit from
their business operations, and they can raise funding from individuals,
groups, and the general public.
Definition
Ownership
The ownership of the public sector The ownership of private sector units is by
units can be by central, state or individuals or entities with zero interference
local government bodies, and this from the government.
ownership is either full or partial.
Motive
The main motive of public sector The main motive of the private sector is to
organisations is to engage in earn profits from their business operations.
activities that serve the general
public.
Source of Capital
The capital for public sector The capital for private sector entities comes
undertakings comes from tax either from its owners or through loans,
collections, excise and other duties, issuing shares and debentures, etc.
bonds, treasury bills etc.
Employment Benefits
Public sector units provide several Private sector units offer benefits like higher
employment benefits like job salary packages, better chances of
security, housing facilities, promotion and recognition, competitive
allowances and retirement benefits. environment and greater incentives in terms
of bonus and other benefits.
Stability
Jobs within the public sector are Jobs within the private sector are not very
very stable since the chances of secure since non-performance can lead to
getting sacked due to non- sacking. Companies can also fire people in
performance are very low. case of cost cutting or scaling down of
operations.
Promotions
The criteria for promotion in the The criteria for promotion in the private
public sector units is generally sector units is generally based on the merit
based on the seniority of the and job performance of the employee.
employee.
Areas
Some of the main areas that come Some of the main areas that come under the
under the public sector are police, private sector are information technology,
military, mining, manufacturing, finance, fast moving consumer goods,
healthcare, education, transport, construction, hospitality, pharmaceuticals,
banking, etc. etc.
Here are the 5 steps that are essential to securing the Digital crime scene.
4. Document the computer date & time and correlate to the real world
to be able to cross-reference the date and times of data evidence in
the digital media.
5. Create evidence seizure and chain of custody documentation, get
the bag and tag etc. accessories ready in preparation of the next
stage.
Once the Digital Crime Scene is secure, then and only then can you begin the
process of evidence seizure.