Computer Forensics Methodologies
List them and explain each one.
Pick one of the methodologies and describe
What tools could you use for what situations.
Procedures that you would follow.
Types of documentation you would need to keep.
Would it need to be done in a mobile lab or not? Why?
Solution
Computer forensics investigation is important now days, it is the term used to describe the
process of investigation, analyze data, and evidance as per the stored information with us. There
are few steps we need to follwed it:-
First we have to acquire the evidance without loosing or damaging data.
Second is make authentiacation on data which you have collected in first step.
And third one is analyze your data.
Following are the phases for computer forensics investigations:-
Identification Case:
Identify the exact information which we gathered for investigation purpose.Ask yourself while
anyalyzing information like, who is the criminal, when it happen, what was the intention behind
that?
Acquisition of evidence:-
Acquisition is to put to execution the acquisition plan designed in the earlier phase that is the
identification. The aim of the acquisition phase is to obtain forensics copies of all the digital
evidence/data that will be required during the next stage which is the Analysis Phase.
In the actual acquisition, procedures are focused primarily on maintaining proper forensics
techniques to ensure that any evidence acquired will be acceptable to the legal proceeding and
can be duplicated and if necessary should be done by an independent third party.
There are different scanario which shoud be consider in this case:-
Environment Documentation and procedural documentation.
Hardware and sofware tools documentation.
Evidance proof of documetation. Etc.
Evidence authentication:-
Use different security alogothm used in computer science for anaylzing data like md5, sha1 etc.
Check recording or any physical proof at the time of situation and analyze it. Check for
fingerproof if any case it is major source to finding case in minimum time.
Showing Proof as per Analysis:-
Make final documenation as per your study, or analysis over the case. So it is easy for the
someone who tooks decision what is right and what is wrong. Whatever you are presenting it
should collected by yourself it menace you shold aware why we present this documents here. All
document s which we are showing should be complete, accurate, and comprehensive
It is important to accurately record the steps taken during the digital evidence examination along
with all the needed details necessary for a third party examiner to reproduce and validate every
piece of evidence.

More Related Content

PPTX
Review on Cyber Forensics - Copy.pptx
DOCX
reserach paper on Study Of Digital Forensics Process.docx
PPTX
Cyber forensic investigation & Analysis
PPTX
Network and computer forensics
PDF
digital forensics-9 of cyber security.pdf
DOCX
Malware analysis
PDF
Cyber Forensics training by Forensic Academy
PDF
Systematic Digital Forensic Investigation Model
Review on Cyber Forensics - Copy.pptx
reserach paper on Study Of Digital Forensics Process.docx
Cyber forensic investigation & Analysis
Network and computer forensics
digital forensics-9 of cyber security.pdf
Malware analysis
Cyber Forensics training by Forensic Academy
Systematic Digital Forensic Investigation Model

Similar to Computer Forensics MethodologiesList them and explain each one.P.pdf (20)

PPT
Cyber forensic standard operating procedures
PPTX
unit 5 understanding computer forensics.pptx
PPT
L11 - Intro to Computer Forensics.ppt
PPT
Chapter 2 - Understanding Computer Investigations.ppt
PDF
A Review on Recovering and Examining Computer Forensic Evidences
PPTX
Chapter 3 cmp forensic
PDF
76 s201924
PDF
Design for A Network Centric Enterprise Forensic System
PDF
Daniel_CISSP_Dom7__1_.pdf
PPTX
Computer Forensics (1).pptx
PPTX
Analysis of digital evidence
PDF
PPTX
Cyber evidence at crime scene
PPTX
computer forensics
PDF
Computer forencis
PPTX
Digital Forensic Case Study
PPTX
Lessons v on fraud awareness (digital forensics)
PPTX
Lessons v on fraud awareness (digital forensics) [autosaved]
PPTX
Introduction to computer forensics in IT society
PPTX
ppt for Module 5 cybersecuirty_023501.pptx
Cyber forensic standard operating procedures
unit 5 understanding computer forensics.pptx
L11 - Intro to Computer Forensics.ppt
Chapter 2 - Understanding Computer Investigations.ppt
A Review on Recovering and Examining Computer Forensic Evidences
Chapter 3 cmp forensic
76 s201924
Design for A Network Centric Enterprise Forensic System
Daniel_CISSP_Dom7__1_.pdf
Computer Forensics (1).pptx
Analysis of digital evidence
Cyber evidence at crime scene
computer forensics
Computer forencis
Digital Forensic Case Study
Lessons v on fraud awareness (digital forensics)
Lessons v on fraud awareness (digital forensics) [autosaved]
Introduction to computer forensics in IT society
ppt for Module 5 cybersecuirty_023501.pptx
Ad

More from feetshoemart (20)

PDF
Convert the following expressions from infix to Reverse Polish Notati.pdf
PDF
Andy and Joan are married and under 65 years of age. They have two c.pdf
PDF
Compare the methods by which the Parsees of India benefitted from th.pdf
PDF
Document2- Word (Product Activation Failed) Mailings Review View Tell.pdf
PDF
Discussion 1 Choose one of the Opinion Poll questions (click here f.pdf
PDF
calculate the hydrogen ion concentration in mol for the following s.pdf
PDF
At a certain temperature, 0.5011 mol of N2 and 1.781 mol of H2 are pl.pdf
PDF
Consider mappinp, phi Z rightarrow R, defined as phi(x) = 2x, where .pdf
PDF
wk3 reply to prof.I need help with this question below a 200 words.pdf
PDF
Write a program that prompts the user to enter a positive integer and.pdf
PDF
Write a function called countElements that counts the number of times.pdf
PDF
This is a java lab assignment. I have added the first part java re.pdf
PDF
There is no video, All you have to do is show how you reference the .pdf
PDF
The process of Imperialism and Colonialism played a role in the esta.pdf
PDF
Terrain AnalysisBackgroundAircraft frequently rely on terrain el.pdf
PDF
What do viral genomes look like compared to those of living organism.pdf
PDF
Verify the identity Verify the identity by transforming the left-han.pdf
PDF
Using following main file and solve the taskInst.pdf
PDF
Suppose there are 14 children trying to form two teams with seven ch.pdf
PDF
11. Define a simple deformable model to detect a half-circular shape.pdf
Convert the following expressions from infix to Reverse Polish Notati.pdf
Andy and Joan are married and under 65 years of age. They have two c.pdf
Compare the methods by which the Parsees of India benefitted from th.pdf
Document2- Word (Product Activation Failed) Mailings Review View Tell.pdf
Discussion 1 Choose one of the Opinion Poll questions (click here f.pdf
calculate the hydrogen ion concentration in mol for the following s.pdf
At a certain temperature, 0.5011 mol of N2 and 1.781 mol of H2 are pl.pdf
Consider mappinp, phi Z rightarrow R, defined as phi(x) = 2x, where .pdf
wk3 reply to prof.I need help with this question below a 200 words.pdf
Write a program that prompts the user to enter a positive integer and.pdf
Write a function called countElements that counts the number of times.pdf
This is a java lab assignment. I have added the first part java re.pdf
There is no video, All you have to do is show how you reference the .pdf
The process of Imperialism and Colonialism played a role in the esta.pdf
Terrain AnalysisBackgroundAircraft frequently rely on terrain el.pdf
What do viral genomes look like compared to those of living organism.pdf
Verify the identity Verify the identity by transforming the left-han.pdf
Using following main file and solve the taskInst.pdf
Suppose there are 14 children trying to form two teams with seven ch.pdf
11. Define a simple deformable model to detect a half-circular shape.pdf
Ad

Recently uploaded (20)

PDF
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 1)
PPTX
Computer Architecture Input Output Memory.pptx
PDF
English Textual Question & Ans (12th Class).pdf
PDF
FORM 1 BIOLOGY MIND MAPS and their schemes
PDF
What if we spent less time fighting change, and more time building what’s rig...
PDF
MBA _Common_ 2nd year Syllabus _2021-22_.pdf
PPTX
Education and Perspectives of Education.pptx
PDF
Paper A Mock Exam 9_ Attempt review.pdf.
PPTX
Virtual and Augmented Reality in Current Scenario
PDF
LIFE & LIVING TRILOGY - PART (3) REALITY & MYSTERY.pdf
PDF
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
PDF
Mucosal Drug Delivery system_NDDS_BPHARMACY__SEM VII_PCI.pdf
PDF
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
PDF
HVAC Specification 2024 according to central public works department
PPTX
A powerpoint presentation on the Revised K-10 Science Shaping Paper
PDF
My India Quiz Book_20210205121199924.pdf
PDF
Environmental Education MCQ BD2EE - Share Source.pdf
PDF
Skin Care and Cosmetic Ingredients Dictionary ( PDFDrive ).pdf
PDF
International_Financial_Reporting_Standa.pdf
PDF
Hazard Identification & Risk Assessment .pdf
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 1)
Computer Architecture Input Output Memory.pptx
English Textual Question & Ans (12th Class).pdf
FORM 1 BIOLOGY MIND MAPS and their schemes
What if we spent less time fighting change, and more time building what’s rig...
MBA _Common_ 2nd year Syllabus _2021-22_.pdf
Education and Perspectives of Education.pptx
Paper A Mock Exam 9_ Attempt review.pdf.
Virtual and Augmented Reality in Current Scenario
LIFE & LIVING TRILOGY - PART (3) REALITY & MYSTERY.pdf
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
Mucosal Drug Delivery system_NDDS_BPHARMACY__SEM VII_PCI.pdf
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
HVAC Specification 2024 according to central public works department
A powerpoint presentation on the Revised K-10 Science Shaping Paper
My India Quiz Book_20210205121199924.pdf
Environmental Education MCQ BD2EE - Share Source.pdf
Skin Care and Cosmetic Ingredients Dictionary ( PDFDrive ).pdf
International_Financial_Reporting_Standa.pdf
Hazard Identification & Risk Assessment .pdf

Computer Forensics MethodologiesList them and explain each one.P.pdf

  • 1. Computer Forensics Methodologies List them and explain each one. Pick one of the methodologies and describe What tools could you use for what situations. Procedures that you would follow. Types of documentation you would need to keep. Would it need to be done in a mobile lab or not? Why? Solution Computer forensics investigation is important now days, it is the term used to describe the process of investigation, analyze data, and evidance as per the stored information with us. There are few steps we need to follwed it:- First we have to acquire the evidance without loosing or damaging data. Second is make authentiacation on data which you have collected in first step. And third one is analyze your data. Following are the phases for computer forensics investigations:- Identification Case: Identify the exact information which we gathered for investigation purpose.Ask yourself while anyalyzing information like, who is the criminal, when it happen, what was the intention behind that? Acquisition of evidence:- Acquisition is to put to execution the acquisition plan designed in the earlier phase that is the identification. The aim of the acquisition phase is to obtain forensics copies of all the digital evidence/data that will be required during the next stage which is the Analysis Phase. In the actual acquisition, procedures are focused primarily on maintaining proper forensics techniques to ensure that any evidence acquired will be acceptable to the legal proceeding and can be duplicated and if necessary should be done by an independent third party. There are different scanario which shoud be consider in this case:- Environment Documentation and procedural documentation. Hardware and sofware tools documentation. Evidance proof of documetation. Etc. Evidence authentication:- Use different security alogothm used in computer science for anaylzing data like md5, sha1 etc. Check recording or any physical proof at the time of situation and analyze it. Check for
  • 2. fingerproof if any case it is major source to finding case in minimum time. Showing Proof as per Analysis:- Make final documenation as per your study, or analysis over the case. So it is easy for the someone who tooks decision what is right and what is wrong. Whatever you are presenting it should collected by yourself it menace you shold aware why we present this documents here. All document s which we are showing should be complete, accurate, and comprehensive It is important to accurately record the steps taken during the digital evidence examination along with all the needed details necessary for a third party examiner to reproduce and validate every piece of evidence.