What is computer forensics when are the results of computer forensics used?

Digital Forensics is defined as the process of preservation, identification, extraction, and documentation of computer evidence which can be used by the court of law. It is a science of finding evidence from digital media like a computer, mobile phone, server, or network. It provides the forensic team with the best techniques and tools to solve complicated digital-related cases.

Digital Forensics helps the forensic team to analyzes, inspect, identifies, and preserve the digital evidence residing on various types of electronic devices.

In this digital forensic tutorial, you will learn:

  • What is Digital Forensics?
  • History of Digital forensics
  • Objectives of computer forensics
  • Process of Digital forensics
  • Types of Digital Forensics
  • Challenges faced by Digital Forensics
  • Example Uses of Digital Forensics
  • Advantages of Digital forensics
  • Disadvantages of Digital Forensics

History of Digital forensics

Here, are important landmarks from the history of Digital Forensics:

  • Hans Gross (1847 -1915): First use of scientific study to head criminal investigations
  • FBI (1932): Set up a lab to offer forensics services to all field agents and other law authorities across the USA.
  • In 1978 the first computer crime was recognized in the Florida Computer Crime Act.
  • Francis Galton (1982 – 1911): Conducted first recorded study of fingerprints
  • In 1992, the term Computer Forensics was used in academic literature.
  • 1995 International Organization on Computer Evidence (IOCE) was formed.
  • In 2000, the First FBI Regional Computer Forensic Laboratory established.
  • In 2002, Scientific Working Group on Digital Evidence (SWGDE) published the first book about digital forensic called “Best practices for Computer Forensics”.
  • In 2010, Simson Garfinkel identified issues facing digital investigations.

Objectives of computer forensics

Here are the essential objectives of using Computer forensics:

  • It helps to recover, analyze, and preserve computer and related materials in such a manner that it helps the investigation agency to present them as evidence in a court of law.
  • It helps to postulate the motive behind the crime and identity of the main culprit.
  • Designing procedures at a suspected crime scene which helps you to ensure that the digital evidence obtained is not corrupted.
  • Data acquisition and duplication: Recovering deleted files and deleted partitions from digital media to extract the evidence and validate them.
  • Helps you to identify the evidence quickly, and also allows you to estimate the potential impact of the malicious activity on the victim
  • Producing a computer forensic report which offers a complete report on the investigation process.
  • Preserving the evidence by following the chain of custody.

Process of Digital forensics

Digital forensics entails the following steps:

  • Identification
  • Preservation
  • Analysis
  • Documentation
  • Presentation

What is computer forensics when are the results of computer forensics used?
Process of Digital Forensics

Let’s study each in detail

Identification

It is the first step in the forensic process. The identification process mainly includes things like what evidence is present, where it is stored, and lastly, how it is stored (in which format).

Electronic storage media can be personal computers, Mobile phones, PDAs, etc.

Preservation

In this phase, data is isolated, secured, and preserved. It includes preventing people from using the digital device so that digital evidence is not tampered with.

Analysis

In this step, investigation agents reconstruct fragments of data and draw conclusions based on evidence found. However, it might take numerous iterations of examination to support a specific crime theory.

Documentation

In this process, a record of all the visible data must be created. It helps in recreating the crime scene and reviewing it. It Involves proper documentation of the crime scene along with photographing, sketching, and crime-scene mapping.

Presentation

In this last step, the process of summarization and explanation of conclusions is done.

However, it should be written in a layperson’s terms using abstracted terminologies. All abstracted terminologies should reference the specific details.

Types of Digital Forensics

Three types of digital forensics are:

Disk Forensics:

It deals with extracting data from storage media by searching active, modified, or deleted files.

Network Forensics:

It is a sub-branch of digital forensics. It is related to monitoring and analysis of computer network traffic to collect important information and legal evidence.

Wireless Forensics:

It is a division of network forensics. The main aim of wireless forensics is to offers the tools need to collect and analyze the data from wireless network traffic.

Database Forensics:

It is a branch of digital forensics relating to the study and examination of databases and their related metadata.

Malware Forensics:

This branch deals with the identification of malicious code, to study their payload, viruses, worms, etc.

Email Forensics

Deals with recovery and analysis of emails, including deleted emails, calendars, and contacts.

Memory Forensics:

It deals with collecting data from system memory (system registers, cache, RAM) in raw form and then carving the data from Raw dump.

Mobile Phone Forensics:

It mainly deals with the examination and analysis of mobile devices. It helps to retrieve phone and SIM contacts, call logs, incoming, and outgoing SMS/MMS, Audio, videos, etc.

When was computer forensics first used?

As early as 1984, the FBI Laboratory and other law enforcement agencies began developing programs to examine computer evidence. To properly address the growing demands of investigators and prosecutors in a structured and programmatic manner, the FBI established the Computer Analysis and Response Team (CART).

What is computer forensics quizlet?

computer forensics. The process of applying scientific methods to collect and analyze data and information that can be used as evidence. computer investigations. Conducting forensic analysis of systems suspected of containing evidence related to an incident or a crime.

How computer forensics is used in investigations?

The computer forensic process The purpose of a computer forensic examination is to recover data from computers seized as evidence in criminal investigations. Experts use a systematic approach to examine evidence that could be presented in court during proceedings.

What are the common situations in which computer forensics is used?

Examples of common scenarios where digital forensics investigations might be needed include:.
Accidental or deliberate company data disclosure. ... .
Intellectual property theft. ... .
Employee internet abuse or misuse. ... .
Incident or breach investigations. ... .
White-collar crimes. ... .
Fraud. ... .
Online harassment. ... .
Human resources investigations..