Preview

Digital Forensic Evidence

Satisfactory Essays
Open Document
Open Document
592 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Digital Forensic Evidence
Evidence should be collected according to procedures that meet all applicable laws and regulations that have been developed from previous discussions with legal staff and appropriate law enforcement agencies, so that any evidence can be acceptable in court [10].

1. Legal investigation
2. Digital forensic support
3. Get system photos after the incident has occurred
4. Report on date and time of the incident
A. Phase 5: Containment and Eradication
An incident should have a different containment and eradication strategy to facilitate effective decision making. The purpose of containment is to limit the scope, magnitude and impact of an incident. There exist some incidents, like computer virus, worms and malicious code, which can spread rapidly and cause extensive damages. Disable the breach of user account, all mistrustful users must be separated from the organization system for additional investigation or analysis. Also, all systems that are being affected must be deactivated until when the incident is finally eliminated from the system. Eradicating an
…show more content…
A copy of the report should be submitted to the organization. To determine the associated cost of the incident, research should be conducted within the organization to quantify the personnel time required for dealing with the incident (including time necessary to restore systems).
1. Identify all lessons learned
2. Document of incident report
3. Revise policies and procedures
4. Improve incident handling process
II. CONCLUSION AND FUTURE WORK
This proposed enhanced model which is appropriate for maintaining and discovering incident in organization. The proposed model will help to minimize the impact of the organization and to avoid any unwanted situation that may occur in the organization.
The future research in this work will involve the implementation of the model in a real world data organization to help to define the functionality of the

You May Also Find These Documents Helpful

  • Powerful Essays

    R V Fraser Case Study

    • 1492 Words
    • 6 Pages

    Evidence must be gathered lawfully or else the prosecution is at risk of it not being able to rely upon in any consecutive hearing or trial as a judge could rule that the evidence is unreasonable.…

    • 1492 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Iscs 451 Assignment 6

    • 576 Words
    • 3 Pages

    A checklist should be created off of the operating procedures and brought to each crime scene by the investigator. Every electronic device should be photographed before touching anything. The checklist should be followed step by step and every item needs to be put into an evidence bag and tagged. Then a chain of custody document needs to be created for every piece of evidence. No analysis should be done on the original copy of any device. All analysis should be done on system image copies of each…

    • 576 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    1)Several specialized forensic fields are devoted to studying biological evidence at a crime scene. One of these fields is forensic palynology, the study of pollen and spore evidence to help solve criminal cases…

    • 1014 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    The last process is to collect and package the evidence in the proper containers. The evidence that is the most important is that evidence that is fragile and can be contaminated easily. This might include fingerprints and blood evidence that could break down quickly. All evidence should be put in separate containers so that the evidence does not get contaminated by another piece of evidence. Firearms should be…

    • 673 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    forensics

    • 449 Words
    • 2 Pages

    What physical evidence did you find at the victim’s home? A box of matches, a space heater, beer bottles, Natalie’s wallet, a V-shaped burn pattern, burned outlet, a protected surface on the ground, crazed glass, and a puddle-shaped burn pattern.…

    • 449 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Week 5 Quiz

    • 531 Words
    • 3 Pages

    Develop incident response procedures Develop and write down how to respond to incidents. Investigate incidents Responding to incidents and fulfilling all requirements as outlined in the response procedures. Protect collected evidence Collect, store, and keep a chain of custody for any/all evidence collected during the investigation…

    • 531 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The prosecution case against the main suspect, Michael Shirley, consisted of four circumstantial pieces of evidence. Forensic evidence is evidence obtained by scientific methods. In the case of Linda Cook, methods used included extracting impressions and DNA. An Athletic shoe impression was found on Cook’s abdomen, sizing at 43-45 and was the right foot. This shoe had a distinctive tread pattern including the obvious impression of the word ‘Flash’ located in the heel. The suspect owned a pair of size 44 athletic shoes with the same tread and stated that he “may” have been wearing them on the night of Linda Cook’s murder. The difficult aspect of locating shoe impressions in forensic cases is that 96% of impressions aren’t used as sufficient forensic evidence (Moles & Sangha 2003). Only 250 pairs of these shoes had been sold in…

    • 682 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    After the preservation phase, forensics are required to locate and identify any evidence that can be used to aid the crime case. There are several locations where evidence are usually found such as in the hard drive on the user’s personal computer, laptop, smart phone or tablet (ACPO, 2012). It is also critical that forensics are aware of the intention of the particular investigation. This aids in the forensics' efforts of locating digital evidences that are relevant to the case. For example, in the case of a server intrusion, forensics should look out for signs such as a rootkit installation, analyze configuration files, logs files and etc. These are possible locations and processes where traces of evidence can be picked out from (Carrier and Spafford, 2003).…

    • 257 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Evidence is a type of proof. It is usually used to prove someone innocent or guilty. There are many different types of evidence, such as: testimony, direct, circumstantial, and physical evidence. However, according to the article “Forensic: Evidence, Clues, and Investigation” by Andrea Campbell, forensic evidence is the best evidence to present at a court case or trial.…

    • 226 Words
    • 1 Page
    Good Essays
  • Satisfactory Essays

    forensic

    • 266 Words
    • 1 Page

    3. Section 404 of the Sarbanes-Oxley Act requires companies to perform self-assessments of risks for business processes that affect financial reporting.…

    • 266 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    6. Why do you think it is so important to use proper methods when collecting evidence from a crime scene?…

    • 479 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Criminal Evidence

    • 1528 Words
    • 7 Pages

    Rights are legal, social, or ethical principles of freedom or entitlement; that is, rights are the fundamental normative rules about what is allowed of people or owed to people. There are many types of rights in our society. In addition to the Constitution, court decisions and statutes are important sources of rights, and so are state constitutions. The Federal Rules of Criminal Procedure sometimes shed light on and clarify important rulings handed down by the U.S. Supreme Court. Additionally, the Federal Rules set forth the criminal procedure guidelines that federal criminal justice practitioners are required to abide by.…

    • 1528 Words
    • 7 Pages
    Good Essays
  • Powerful Essays

    Data Modeling by Example

    • 8185 Words
    • 33 Pages

    This book adopts a unique approach which is based on using existing Data Models as the basis for designing new ones to meet specific requirements.…

    • 8185 Words
    • 33 Pages
    Powerful Essays
  • Good Essays

    • DBMS models real world • Data Model is link between user’s view of the world and bits stored in computer • Many models exist • We think in terms of..…

    • 2515 Words
    • 11 Pages
    Good Essays
  • Better Essays

    ADMISSIBILITY OF THE OPINION OF A COMPUTER FORENSICS EXAMINER AS AN EXPERT EVIDENCE UNDER NIGERIAN LAW OF EVIDENCE By…

    • 2122 Words
    • 9 Pages
    Better Essays