Ryan_Gillard_ITDI_375_Unit1

.docx

School

American InterContinental University *

*We aren’t endorsed by this school

Course

375

Subject

Computer Science

Date

Dec 6, 2023

Type

docx

Pages

5

Uploaded by ryangillard155

Report
1 Digital Investigation Brief Ryan Gillard American Intercontinental University ITDI 375 2103A-01: Digital Investigations I Professor Liston, James 22 June 2021
2 There two types of digital forensic investigations and they are: public investigations and private investigations. Public investigations “are conducted against the suspected people to detect the crime scene” and “generally government agencies handle such types of investigations” (What is Digital Forensics & How is it Used in Investigations, 2020). Public investigations are normally conducted under criminal investigations since the investigations are usually done in tandem with criminal cases. Private investigations “are carried out for crimes related to business, offices and organizations” that involve “any kind of violation of the terms and policies of” the private sector (What is Digital Forensics & How is it Used in Investigations, 2020). Private investigations are also known as corporate investigations. Digital forensic investigations “is a step-by-step procedure carried out meticulously” and “ii ensures that no original evidence is destroyed in the process” while the examiner is in custody of the digital equipment in the case (What is Digital Forensics & How is it Used in Investigations, 2020). There are five main steps to a digital forensics investigation and they are: identification, collection, preservation, analysis, and reporting. Identification is the very first step in the investigation because it involves where the forensic person has to identify which pieces of digital equipment can be used to help in the case and also later help with evidence. Collection of the digital equipment is the next step. Collection is split into four different categories: volatile data collection, live system imaging, forensic imaging, and seize digital devices physically. Volatile data collection is “the collection of all the executing data like user-logged in details, date, time, and other RAM data” while the system is on (What is Digital Forensics & How is it Used in Investigations, 2020). Live system imaging “includes the imaging action performed on data during the examination” with the machine on (What is Digital Forensics & How is it Used in Investigations, 2020). Forensic imaging duplicates the original to perform imaging actions. The exact copies perform manipulations and
3 hashing techniques are used to make that privacy is maintained, while the system is off during the process. Seizing digital devices physically is a last resort for when the previous methods fail. During this collection, all devices are seized and all digital evidence that can be used will be collected. The system can be on or off depending on the situation. Preservation is necessary because it imperative that the crime scene is preserved and that “all the Electronically Stored Information” is preserved even though it is removed from the scene (What is Digital Forensics & How is it Used in Investigations, 2020). Analysis is the thorough investigation of all of the digital evidence that is collected. Proper imaging is used to keep the validity of the evidence. The digital investigation and the study of the crime scene can help the investigator come to a conclusion that will potentially solve the crime. Detectives will use markers to indicate directions and point out things that may be unnoticeable to the naked eye due to being embedded into something or the direction that something has moved. Flags “can be set in place to show the evidence to pathways of suspects, a trail of blood, the pathways of projectiles, and items obscured in the surface covering” even if the crime scene is “an indoor scene, outdoor scene, as well as inside a vehicle or vessel” (Byrd, n.d). The detective will have the investigators take pictures from far away, midrange, and up close to make sure that nothing is left out of the investigations and to make sure that any potential evidence is captured within a picture. The evidence will have to be properly labeled so that it does not get messed up, lost, or potentially destroyed on accident. The markers are used “in the field as a successful tool that will reveal, simplify, organize and identify the numerous items of evidence found at crime scenes” (Byrd, n.d.). After the crime scene has been thoroughly photographed from every angle in its undisturbed state, then markers (photo tents or flags) can be used. “A series of photographs will then need to be taken from each prospective to
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help