Process of Digital Forensics: Identification
Process of Digital Forensics: Identification
Process of Digital Forensics: Identification
The objective is to preserve any evidence in its most original form while performing a
structured investigation by collecting, identifying, and validating the digital information
to reconstruct past events focusing on the context.
Identification
The first step in the forensic process. The identification process mainly includes things like
what evidence is present, where it is stored, and lastly, how it is stored (in which format).
Preservation
Electronic storage media can be personal computers, Mobile phones, PDAs, etc.
Analysis
In this phase, data is isolated, secured, and preserved. It includes preventing people
from using the digital device so that digital evidence is not tampered with.
Documentation
In this step, investigation agents reconstruct fragments of data and draw conclusions
based on evidence found. However, it might take numerous iterations of examination
to support a specific theory.
Presentation
In this process, a record of all the visible data must be created. It helps in recreating
the investigated scene and reviewing it. It involves proper documentation of the scene,
along with all the forensic team performing the steps to present in their report.
Computer Forensics is one important aspect out of many and playing a major role relying
on the science of Digital Forensics behind it. The goal of computer forensics is to examine
digital data with the aim of identifying, preserving, recovering, analyzing and presenting
facts and opinions about the digital information.
It helps to postulate the motive behind the offense and identity of the main culprit.
Data acquisition and duplication: Recovering deleted files and deleted partitions
from digital media to extract the evidence and validate them.
Helps you to identify the evidence quickly, and also allows you to
estimate the potential impact of the malicious activity on the victim.
@blackhatethicalhacking