Roadmap of Digital Forensics Investigation Process with Discovery of Tools

2022 ◽  
pp. 241-269
Author(s):  
Anita Patil ◽  
Soumi Banerjee ◽  
Dipti Jadhav ◽  
Gautam Borkar
Author(s):  
Ruuhwan Ruuhwan ◽  
Imam Riadi ◽  
Yudi Prayudi

The handling of digital evidence can become an evidence of a determination that crimes have been committed or may give links between crime and its victims or crime and the culprit. Soft System Methodology (SSM) is a method of evaluation to compare a conceptual model with a process in the real world, so deficiencies of the conceptual model can be revealed thus it can perform corrective action against the conceptual model, thus there is no difference between the conceptual model and the real activity. Evaluation on the IDFIF stage is only done on a reactive and proactive process stages in the process so that the IDFIF model can be more flexible and can be applied on the investigation process of a smartphone.


Author(s):  
Mitko Bogdanoski ◽  
Marjan Stoilkovski ◽  
Aleksandar Risteski

There are many freeware and commercial tools which can be used to provide forensics information based on dead and live forensics acquisition. The main problem with these tools is that in many cases the investigator cannot explain the script functionality and generated results and information during the trial. Because of this reason there is an increased need for developing and using script which can be easy explained and adapted to any analysis which should be made by the examiners. The chapter presents a novel developed First Responder script which can be used to perform a live and dead forensics analysis in support of Law Enforcement during the investigation process.


Author(s):  
Siti Rahayu Selamat ◽  
Sharifah Sakinah Syed Ahmad ◽  
Mohd Zaki Masud ◽  
Nor Hafeizah Hassan ◽  
Shahrin Sahib

Author(s):  
Ludwig Englbrecht ◽  
Günther Pernul

Stricter policies, laws and regulations for companies on the handling of private information arise challenges in the handling of data for Digital Forensics investigations. This paper describes an approach that can meet necessary requirements to conduct a privacy-aware Digital Forensics investigation in an enterprise. The core of our approach is an entropy-based identification algorithm to detect specific patterns within files that can indicate non-private information. Therefore we combine various approaches with the goal to detect and exclude files containing sensitive information systematically. This privacy-preserving method can be integrated into a Digital Forensics examination process to prepare an image which is free from private as well as critical information for the investigation. We implemented and evaluated our approach with a prototype. The approach demonstrates that investigations in enterprises can be supported and improved by adapting existing algorithms and processes from related subject areas to implement privacy-preserving measures into an investigation process.


2021 ◽  
Vol 13 (6) ◽  
pp. 0-0

The extensive use of digital devices by individuals generates a significant amount of private data which creates challenges for investigation agencies to protect suspects' privacy. Existing digital forensics models illustrate the steps and actions to be followed during an investigation, but most of them are inadequate to investigate a crime with all the processes in an integrated manner and do not protect suspect's privacy. In this paper, we propose the development of a privacy-preserving digital forensics (P2DF) framework, which facilitates investigation through maintaining confidentiality of the suspects through various privacy standards and policies. It includes an access control mechanism which allows only authorized investigators to access private data and identified digital evidences. It is also equipped with a digital evidence preservation mechanism which could be helpful for the court of law to ensure the authenticity, confidentiality, and reliability of the evidences, and to verify whether privacy of the suspect was preserved during the investigation process.


Author(s):  
Mitko Bogdanoski ◽  
Marjan Stoilkovski ◽  
Aleksandar Risteski

There are many freeware and commercial tools which can be used to provide forensics information based on dead and live forensics acquisition. The main problem with these tools is that in many cases the investigator cannot explain the script functionality and generated results and information during the trial. Because of this reason there is an increased need for developing and using script which can be easy explained and adapted to any analysis which should be made by the examiners. The chapter presents a novel developed First Responder script which can be used to perform a live and dead forensics analysis in support of Law Enforcement during the investigation process.


Author(s):  
Prof. Sachin Babulal Jadhav

Digital crimes are taking place over the entire world. For any digital crime which commit at any part of world, computer or any electronic devices are used. The devices which are used to commit the crime are useful evidences which must be identified and protected for further use. The crimes involving electronic devices are called as cyber-crime. To investigate such crimes, a scientific procedures needs to be followed. The data collection, analysis, preservation and presentation of digital evidence is must in order investigate the cybercrime. This paper highlights the practices that are used worldwide in the investigation process of cyber-crime. Keywords: Digital Forensics, Analysis, Investigation, models of investigation.


Author(s):  
Anand Desai ◽  
Siddhesh Masurkar

With the advancement and growing science of technology and the internet, the threats to data and digital devices have been increasing due to hackers and data invigilators. So the branch of DIGITAL FORENSIC has been set up for the investigation of the cybercrimes committed through the means of the internet, network, digital devices, etc. There are millions of internet users worldwide who are targeted by these hackers, and they lose their data to these data thieves unknowingly. This data can be misused by cybercriminals for various purposes. This branch of forensic science tracks and investigates these cyber criminals and finds the appropriate evidence against them. This paper surveys the work of this branch gives you a brief explanation about the various sub-branches, job opportunities available, and several tools used in this investigation process.


Sign in / Sign up

Export Citation Format

Share Document