Essay Describing and Discussing the Processes and Challenges Involved in Identifying, Recovering, Securing, Examining, Analysing and Preparing Digital Evidence from a Crime Scene

4924 Words May 5th, 2013 20 Pages
Table of Contents Section1: Introduction 2 Section 2: Describe digital evidence 2 Section 3: Explain the key principles of cyber forensics 5 Standardization 5 Evidence integrity and reliability 5 Section 4: Discuss investigation processes 6 Preserve evidence 6 Locate evidence 6 Select evidence 7 Analyze evidence 7 Validate evidence 7 Present evidence 7 Section 5: Discuss and the importance of crime reconstruction hypotheses and alternative 7 Section 6: Conclusion 8 Reference 8

Research Essay
(Words count: 4,033)

Section1: Introduction Cyber forensics is becoming more and more common in crime investigation, this is expected, because of the relentless development of technology brings along with it crime related with
…show more content…
There are 2 types of hashes: MD5 and SHA1. 2. Metadata:
The concept of metadata is "data about data" which has simple in principle but very confusing in details. Metadata appears in all kind of file, it acts like a person behind the scene, records many information about the file such as Internet history files have the information about what Web page is accessed at a certain timeline. There are 4 common types of metadata: Internet metadata, Document metadata, File system metadata, Picture metadata. 3. Thumbnail and the thumbnail cache:
Thumbnail is the small picture that is collected automatically by the computer. In an activity which is initiated by the user like open a web page, there are thousands of small images that are captured and stored as thumbnails, the place where thumbnails are stored is a special file called thumbnail cache. In cyber forensics, thumbnail and thumbnail cache can be used to prove the existence of suspicious image files, even if those image files are deleted as the thumbnail cache file, thumbs.bd, retain the thumbnail images in it. 4. Deleted data:
The criminals always try to leave no traces behind the crime scene, and if there are traces, they will try to erase them. In cyber forensics, those traces are data and recovery deleted data is the foundation of cyber forensics. Deleted data in computer usually can

More about Essay Describing and Discussing the Processes and Challenges Involved in Identifying, Recovering, Securing, Examining, Analysing and Preparing Digital Evidence from a Crime Scene

Open Document