Digital Forensics: Computer Forensics Analysis and Validation
Digital Forensics: Computer Forensics Analysis and Validation
Module 5
Computer Forensics Analysis and Validation
Scope creep
Scope creep happens when investigation expands beyond the original
description
Occurs when unanticipated evidence is found
May be caused because attorneys want more exploration to be done by
the investigators
Increases time and effort
In criminal cases more detailed examination is often needed before trial
3
Exercise
List the basic steps to be taken for all digital forensics investigations.
Hints:
Use formatted disks/ media free of malware
Observe the state of the impounded computer
Make a list of hardware on the suspect’s computer
Work on the drive’s contents in an orderly fashion, according to logical
reasoning etc.
4
Answering for all disk space when analyzing an evidence drive can help
detect hidden partitions
Analyzing disk areas containing space that cannot be reported can also help
detect hidden partitions
A data-hiding technique used in FAT file systems is placing secret or
criminative data in free or slack space on disk partition clusters
Good clusters can be marked as bad clusters to make them appear
unusable
8
Exercise
Study some encryption algorithms
Read about BitLocker - a full volume encryption feature included
with Microsoft Windows versions
https://en.wikipedia.org/wiki/BitLocker
Study the Encrypting File System
https://en.wikipedia.org/wiki/Encrypting_File_System
Explore steganography https://en.wikipedia.org/wiki/Steganography
10
References
Nelson, Amelia Philips, Christopher Steuart, “ Guide to Computer
Forensics and Investigations”, Fifth Edition, 2015
Wikipedia