Process of Digital Forensics: Identification

Download as pdf or txt
Download as pdf or txt
You are on page 1of 1

Digital forensics is the process of uncovering and interpreting electronic data.

The objective is to preserve any evidence in its most original form while performing a
structured investigation by collecting, identifying, and validating the digital information
to reconstruct past events focusing on the context.

Process of Digital forensics


Digital Forensics entails the following steps:

Identification
The first step in the forensic process. The identification process mainly includes things like
what evidence is present, where it is stored, and lastly, how it is stored (in which format).

Preservation
Electronic storage media can be personal computers, Mobile phones, PDAs, etc.

Analysis
In this phase, data is isolated, secured, and preserved. It includes preventing people
from using the digital device so that digital evidence is not tampered with.

Documentation
In this step, investigation agents reconstruct fragments of data and draw conclusions
based on evidence found. However, it might take numerous iterations of examination
to support a specific theory.

Presentation
In this process, a record of all the visible data must be created. It helps in recreating
the investigated scene and reviewing it. It involves proper documentation of the scene,
along with all the forensic team performing the steps to present in their report.

Digital Forensics has a lot of different fields.

Computer Forensics is one important aspect out of many and playing a major role relying
on the science of Digital Forensics behind it. The goal of computer forensics is to examine
digital data with the aim of identifying, preserving, recovering, analyzing and presenting
facts and opinions about the digital information.

Objectives of Computer Forensics


The essential objectives of using Computer Forensics:

After Digital Forensics has been performed, the objective is to assemble


the data in order to produce a complete computer forensics report in such a manner
that it helps the investigation agency to present them as evidence in a court of law.

It helps to postulate the motive behind the offense and identity of the main culprit.

Designing procedures at a suspected breach which helps you


ensure that the digital evidence obtained is not corrupted.

Data acquisition and duplication: Recovering deleted files and deleted partitions
from digital media to extract the evidence and validate them.

Helps you to identify the evidence quickly, and also allows you to
estimate the potential impact of the malicious activity on the victim.

Preserving the evidence by following the chain of custody.

The rising significance of Digital Forensics is creating an increased demand for


computer forensics talent. As we know Data Breaches are occurring everyday,
Digital Forensics must get involved in the process of recovering data,
tracing the intruders by analyzing the incident.

@blackhatethicalhacking

You might also like