Business Continuity Plan

 Essay about Business Continuity Plan

Data Sources in Digital Forensics

Drive 17, 2013

Joana Achiampong

CSEC 600


4 sources of info that stand out for forensic investigators in most criminal research are data, operating systems, routers and network traffic, and social network activity. Each databases presents many different opportunities and challenges for investigators, which means that the more dependable data collection and analysis activity typically involves study of a variety of options. Digital forensics must cover the several basic phases of activity, which include: data collection, which will describes the identification and acquisition of relevant data; data examination, consisting of the processing of data by using automated and manual tools; analysis, which usually describes the evaluation and categorization of examined info into logical groups, including their performance in a court docket proceeding; and reporting, in which the results of analysis are defined with careful attention paid to recommendations (Marcella & Menendez, 2009). The viability of each data source to an investigation should be evaluated depending upon how they can play a role in each period. For example , the ability of routers and switches as a databases to help investigators might be powerful in one area, but not in the other 3. An examination of router activity might yield a surfeit of observable data that fails to offer diverse analytical tools that cannot be depended on in a forensic setting. An additional example is definitely network visitors, which may yield a large amount of info that is untrustworthy or provides a high level of volatility (Garfinkel, 2010). Period is often important for forensic detectives, and it is generally important to find out in advance the dynamics of each and every data source. It will help investigators avoid wasted period, or hanging out analyzing data that may of minimal aid in a forensic setting. Thereby, it is important to critically assess the pros and cons of each and every data source for his or her ability to present contributions.

A valid assessment of each data source must be made based upon consistent elements such as costs, data sensitivity, and time spent. The overall costs of each data bank depend on the apparatus that will be required to collect and analyze info without problem. Costs as well refer to the courses and labor required during the course of the collection and analysis, that could be higher to get uncommon resources that require an exclusive process and chain of command routine. Data level of sensitivity is critical is actually a forensic tool, but may be more sketchy depending on the supply. For example , network activity can provide a wealth of info depending on the device and establishing upon which data is transferred. However , a network environment with many devices and multiple configurations might provide untrustworthy data that cannot be recognized in courtroom proceedings. Additionally , chain-of-command concerns regarding the contribution of outside network analysts may compromise a source that might be otherwise valid. These issues have to be considered in just about any data source assessment. Data Files

The most frequent data sources in a digital forensic exam are current and wiped files. The majority of forensic detectives in most data retrieval environments begin with an examination of the different media shop on the hard disk of a computer, network, or perhaps mobile unit. The variety of types of stored data in current and deleted documents, in addition to partitioned supply files as well as the slack space of a device's memory, may be massive and diverse. An average first step in data retrieval is to power down a system and create a info grab or forensic duplicate upon which collection and evaluation can be produced. This ensures the sincerity of the first data, whilst allowing detectives the ability to shape data nonetheless they see fit. Yet , this process only creates challenges for forensic investigators, which includes an lack of ability to capture live system info....

References: Aquilina, J., Casey, E. & Malin, C. (2008). Malware forensics: Checking out and

Analyzing Malicious Code

Bui, T., Enyeart, M. & Luong, J. (2003, May). Issues in Computer system Forensics. Recovered

Gast, T. (2010). Forensic info handling. The company Forum. Recovered from htm

Humaid, H., Yousif, A. & Said, They would. (2011, December). Smart phones forensics and sociable


Huston, G. (2004, September). Physiology: A look inside network treat translators. The

Internet Protocol Journal, 7(3)

Marcella, A. & Menendez, D. (2008). Cyber Forensics: A Field Manual for Collecting,

Examining, and Preserving Data

Schwartz, M. (2011, December). How digital forensics detects insider thievery.

Sindhu, T., Tripathi, H. & Meshram, B. (2012). Digital forensic investigation upon file

program and data source tampering

 Essay about 12 Upset Men

Essay about 12 Upset Men

12 Angry Men 12 Angry Men   12 Angry Men, by the American playwright Reginald Rose, was originally created for tv set, and it was broadcast…...

 Leaving Home Dissertation

Leaving Home Dissertation

Later a place they will connected with, a spot they by no means want to leave. Anywhere they truly feel safe. Producing connections with places and things is actually…...