preview

Digital Forensic Analysis

Decent Essays

This document provides the digital forensic investigator with basic information regarding interviews for a cyber incident. Accordingly, it provides information gathered thru an interview and the process to take. Additionally, information is provided on who to interview and what information to gather is provided; as well as the tools and resources needed. Furthermore, an interview process is explained that provides investigators with a standard operating procedure to follow. Further in the document there is a section that provides the reader with an interview methodology. This methodology provides a model to follow that provides an effective manner to interview an individual. Finally, a section providing information on recording devices to utilize …show more content…

It is pertinent during the preparation phase of an investigation, as well as the examination and documentation phases. Furthermore, these interviews are being conducted to gather information regarding the case to ensure the digital forensic investigator may plan their investigation accordingly. However, if a digital forensic investigator does not take time to prepare for the case, than they may overlook a crucial piece of evidence. Therefore, it is necessary that digital forensic investigators understand the interview process and how victims, suspects, or witnesses would react to questioning (UMUC, 2015). Accordingly, this document provides information regarding the material obtained from an interview, the interview methodology, and the recording methods that may be utilized during an …show more content…

For this reason, it is imperative that the information gathered is reliable and accurate to ensure the evidence collected can be utilized by the digital forensic investigator for the current case (Ingalls & Rodriguez, 2011). Additionally, cyber incidents require digital forensic investigators to interview various individuals regarding the information needed for the case. According to the National Institute of Justice (2004), interviewing the system administrator, users, and employees of an organization regarding a cyber incident would provide investigators with valuable information; for example, user accounts, email accounts, network configuration, logs, and passwords. Furthermore, for digital forensic investigators to conduct an effective interview, they must have the proper tools and training to employ the interview process. For instance, formal procedures or instructions should be developed and implemented to ensure that the investigator follows a standard during all investigations. Additionally, training should be provided to ensure that digital forensic investigators comprehend by what means to prepare, conduct, and evaluate an interview. Furthermore, resources should be made available for digital forensic investigators to accomplish their tasks; for example, recording devices and references. Also, definitions should be provided to the digital forensic investigators for

Get Access