Vnd.openxmlformats Officedocument.wordprocessingml.document&Rendition=1 3
Vnd.openxmlformats Officedocument.wordprocessingml.document&Rendition=1 3
The digital forensics process is shown in the following figure. Forensic life
cycle phases are:
4. Examination/investigation
6. Reporting
7. Testifying
Watch the below video to learn about digital forensics life cycle:
Different files
Files and file systems
Processes and files
Log files
Digital evidence can be collected from many sources. The obvious sources
can be:
Mobile phone
Digital cameras
Hard drives
CDs
USB memory devices
Care should be taken that evidence does not go anywhere without properly
being traced. Things that can go wrong in storage include:
Forensics specialist should ensure that he/she has proper legal authority to
seize, copy and examine the data. As a general rule, one should not examine
digital information unless one has the legal authority to do so. Forensic
investigation performed on data at rest (hard disk) is called dead analysis.
Many current attacks leave no trace on the computer’s hard drive. The
attacker only exploits the information in the computer’s main memory.
Performing forensic investigation on main memory is called live analysis.
Sometimes the decryption key might be available only in RAM. Turning off
the system will erase the decryption key. The process of creating and exact
duplicate of the original evidence is called imaging. Some tools which can
create entire hard drive images are:
DCFLdd
Iximager
Guymager
Media analysis
Media management analysis
File system analysis
Application analysis
Network analysis
Image analysis
Video analysis
6. Reporting
After the analysis is done, a report is generated. The report may be in oral
form or in written form or both. The report contains all the details about the
evidence in analysis, interpretation, and attribution steps. As a result of the
findings in this phase, it should be possible to confirm or discard the
allegations. Some of the general elements in the report are:
7. Testifying