Computer Forensics Fundamentals
Digital Forensics

Computer Forensics Fundamentals

Project Name: Computer Forensics Fundamentals

Description: This blog will help all forensics investigator for Computer Forensics Fundamentals

Author: Rohit D Sadgune

Frequently Asked Question on Computer Forensics Investigation

  • Checklist of Computer Forensics Fundamentals

 

  1. Protect the suspected digital media during the forensic examination from any possible alteration, damage, data corruption, or virus introduction.
  2. Discover all files on the suspected digital media. This includes existing normal files, deleted yet remaining files, hidden files, password-protected files, and encrypted files.
  3. Recover all (or as much as possible of) discovered deleted files.
  4. Reveal (to the greatest extent possible) the contents of hidden files as well as temporary or swap files used by both the application programs and the operating system.
  5. Access (if possible and legally appropriate) the contents of protected or encrypted files.
  6. Analyze all possibly relevant data found in special (and typically inaccessible) areas of a disk. This includes but is not limited to what is called unallocated space on a disk (currently unused, but possibly the repository of previous data that is relevant evidence), as well as slack space in a file (the remnant area at the end of a file in the last assigned disk cluster that is unused by current file data, but once again, may be a possible site for previously created and relevant evidence).
  7. Print out an overall analysis of the subject computer system, as well as a listing of all possibly relevant files and discovered file data.
  8. Provide an opinion of the system layout; the file structures discovered; any discovered data and authorship information; any attempts to hide, delete, protect, and encrypt information; and anything else that has been discovered and appears to be relevant to the overall computer system examination.
  9. Provide expert consultation and/or testimony, as required.

GO BACK TO COMPUTER FORENSICS CHECKLIST

No Comments

Leave a Reply

Your email address will not be published. Required fields are marked *

*

Cyber Threat Analytics
Digital Forensics
Reconstructing Past Digital Events

Reconstructing Past Digital Events Project Name: Reconstruction of Past Digital Events Description: This blog will help all forensics investigator to Reconstruct of Past Digital Events. Author: Rohit D Sadgune Frequently Asked Question on Computer Forensics Investigation How to Reconstructing Past Digital Event Backup of Digital Events Importanance of Reconstructing Past …

Principal Computer Forensic Activities Checklist Form
Digital Forensics
1
Digital Forensic Checklist

Digital Forensic Checklist Project Name: Digital Forensic Checklist Description: This blog will help all forensics investigator for Digital Forensic Checklist Author: Rohit D Sadgune Frequently Asked Question on Computer Forensics Investigation Checklist of Principal Digital Forensic Activities Checklist Form   Safely seize computer systems and files to avoid contamination and/or interference. …

Types of Computer Forensics Technology
Digital Forensics
Types of Computer Forensics Technology

Types of Computer Forensics Technology Project Name: Types of Computer Forensics Technology Description: This blog will help all forensics investigator for Types of Computer Forensics Technology Author: Rohit D Sadgune Frequently Asked Question on Computer Forensics Investigation Checklist of Types of Computer Forensics Technology   Move documentary evidence quickly from …

%d bloggers like this: