42 research outputs found

    Computer Forensics Field Triage Process Model

    Get PDF
    With the proliferation of digital based evidence, the need for the timely identification, analysis and interpretation of digital evidence is becoming more crucial. In many investigations critical information is required while at the scene or within a short period of time - measured in hours as opposed to days. The traditional cyber forensics approach of seizing a system(s)/media, transporting it to the lab, making a forensic image(s), and then searching the entire system for potential evidence, is no longer appropriate in some circumstances. In cases such as child abductions, pedophiles, missing or exploited persons, time is of the essence. In these types of cases, investigators dealing with the suspect or crime scene need investigative leads quickly; in some cases it is the difference between life and death for the victim(s). The Cyber Forensic Field Triage Process Model (CFFTPM) proposes an onsite or field approach for providing the identification, analysis and interpretation of digital evidence in a short time frame, without the requirement of having to take the system(s)/media back to the lab for an in-depth examination or acquiring a complete forensic image(s). The proposed model adheres to commonly held forensic principles, and does not negate the ability that once the initial field triage is concluded, the system(s)/storage media be transported back to a lab environment for a more thorough examination and analysis. The CFFTPM has been successfully used in various real world cases, and its investigative importance and pragmatic approach has been amply demonstrated. Furthermore, the derived evidence from these cases has not been challenged in the court proceedings where it has been introduced. The current article describes the CFFTPM in detail, discusses the model’s forensic soundness, investigative support capabilities and practical considerations

    Paper Session II: Computer Forensics Field Triage Process Model

    Get PDF
    With the proliferation of digital based evidence, the need for the timely identification, analysis and interpretation of digital evidence is becoming more crucial. In many investigations critical information is required while at the scene or within a short period of time - measured in hours as opposed to days. The traditional cyber forensics approach of seizing a system(s)/media, transporting it to the lab, making a forensic image(s), and then searching the entire system for potential evidence, is no longer appropriate in some circumstances. In cases such as child abductions, pedophiles, missing or exploited persons, time is of the essence. In these types of cases, investigators dealing with the suspect or crime scene need investigative leads quickly; in some cases it is the difference between life and death for the victim(s). The Cyber Forensic Field Triage Process Model (CFFTPM) proposes an onsite or field approach for providing the identification, analysis and interpretation of digital evidence in a short time frame, without the requirement of having to take the system(s)/media back to the lab for an in-depth examination or acquiring a complete forensic image(s). The proposed model adheres to commonly held forensic principles, and does not negate the ability that once the initial field triage is concluded, he system(s)/storage media be transported back to a lab environment for a more thorough examination d analysis. The CFFTPM has been successfully used in various real world cases, and its investigative importance and pragmatic approach has been amply demonstrated. Furthermore, the derived evidence from these cases has not been challenged in the court proceedings where it has been introduced. The current article describes the CFFTPM in detail, discusses the model’s forensic soundness, investigative support capabilities and practical considerations

    Mapping Process of Digital Forensic Investigation Framework

    Get PDF
    Digital forensics is essential for the successful prosecution of digital criminals which involve diverse digital devices such as computer system devices, network devices, mobile devices and storage devices. The digital forensic investigation must be retrieved to obtain the evidence that will be accepted in the court of law. Therefore, for digital forensic investigation to be performed successfully, there are a number of important steps that have to be taken into consideration. The aim of this paper is to produce the mapping process between the processes/activities and output for each phase in Digital Forensic Investigation Framework (DFIF). Existing digital forensic frameworks will be reviewed and then the mapping is constructed. The result from the mapping process will provide a new framework to optimize the whole investigation process

    The General Digital Forensics Model

    Get PDF
    The lack of a graphical representation of all of the principles, processes, and phases necessary to carry out an digital forensic investigation is a key inhibitor to effective education in this newly emerging field of study. Many digital forensic models have been suggested for this purpose but they lack explanatory power as they are merely a collection of lists or one-dimensional figures. This paper presents a new multi-dimensional model, the General Digital Forensics Model (GDFM), that shows the relationships and inter-connectedness of the principles and processes needed within the domain of digital forensics. Keywords: process model, computer forensics, expert learning, educational framework, digital forensic

    Digital Evidence and Best Evidence Rule Legal-Technological Approach headed for Digital Evidence Admissibility Review

    Get PDF
    Computer forensic whizzes do their utmost to employ effective tools and methodologies to extract and analyze data from storage devices used at the digital crime scene to acquire and be able to present admissible evidence in court. This paper is an attempt and a trial to highlight the areas of discussions and critical review of the available guidelines used to achieve successful computer crime investigation that is compatible with best evidence rule. The enforcement of information laws is a step in the right direction towards a knowledge-based well established cyber security, however having laws alone isn’t enough for carrying out valid and effective confrontation against cyber criminals. Consequently this paper studies the common factors and elements in the computer crime case with focus on best evidence rule and suitable road map process of Digital Forensic Investigation Framework (DFIF) to maintain a close cooperation between parties through effective use of legal concepts and technology. The paper discusses the main challenges and basics needed to be handled, and observed closely to grasp a successful prosecution of a cybercriminal. Basically, the paper deliberates and reviews deferent investigation frameworks of cybercrime with emphasis on the most prominent frameworks, legal requirements, technological, and technical practices needed over and done with studying cybercrime categories, rules of evidence in court, employing historical critical literature review and the study of restrictions imposed over admissibility of digital evidence

    A Review on Digital Forensic Investigation Frameworks and Real World Cyber Crime Cases

    Get PDF
    At this modern phase of technology now it has turned out to be potential for public with fairly low practical talents to pinch thousands of pounds in a time in staying their homes. Therefore, all manufacturing firms, the competent commercial method governed through horizontal split-up of production developments, expert services and sales channels etc., (each requiring specialized skills and resources), in addition to that a good deal of business at expenses set by the market forces of quantity and claim. Accordingly, Cybercrime is no different; where it claims a floating worldwide market for skills, tools and finished product. Even it consumes its own money. The augmentation of cybercrime is in distinguishably associated to the ubiquity of credit card dealings and also for the online bank accounts. Cybercrime has developed a business and the demographic of the distinctive cybercriminal is fluctuating promptly, from bedroom-bound weed to the form of structured mobster more conventionally connected with drug-trafficking, coercion and currency decontaminating. The existing research hosts an organized and reliable methodology for digital criminological examination. As a result, the digital forensic science affords the tools, methods and technically upheld approaches that can be castoff to procure and explore the digital evidence. The digital forensic analysis need to be rescued to acquire the signals that will be recognized in the court of law. This study highlights on a organized and unswerving method to digital forensic analysis. In further, this research target sin categorizing the actions that enable and advance the digital forensic investigation practices. The top most cybercrime and prevailing digital forensic framework will be appraised and then the investigation will be assembled

    A Review on Computer Forensics

    Get PDF
    Activities cyber crimes have become worse important part of everyday life in both the corporate world and the general public. The phenomenon of digital crime achieved what one might call the overwhelming factor. This explores the need for computer forensics to exercise effective and legal way, and describe the basic technical issues, and a reference point for further reading. It promotes the idea that competent practice in computer science and awareness of the fundamental laws of the retina for organizations today. This is an important topic for managers who need to understand how come a strategic element of computer science in the public information organization IT security. Network administrators and other IT security staff members need to understand the issues related to computer science. Those who work in the field of corporate governance, legal services, information technology, or find an overview of Sciences

    The Comprehensive Digital Forensic Investigation Process Model (CDFIPM) for Digital Forensic Practice

    Get PDF
    Nowadays, as a result of the ubiquitous nature of information technology, evidence presented in court is less likely to be on paper. Evidence of computer crime also differs from that related to traditional crimes for which there are well established standards and procedures. In order for digital evidence to be admissible, investigators need to demonstrate that they have specialised knowledge and have applied reliable principles and models to acquire it. Careful notice is taken in court of the manner in which the digital investigative process has been carried out. However, despite such requisites, the field of digital forensics still lacks formal process models that courts can employ to determine the reliability of the process followed in a digital investigation. The existing models have often been developed by digital forensic practitioners, based on their own personal experience and on an ad-hoc basis, without attention to the establishment of standardisation within the field. This has prevented the institution of the formal processes that are urgently required. Moreover, as digital forensic investigators often operate within different fields of law enforcement, commerce and incident response, the existing models have often tended to focus on one particular field and have failed to consider all environments. This has hindered the development of a generic model that can be applied in all the different fields of digital forensics. In addition, the existing models often capture only one part of the investigative process as opposed to the entire process. To address these shortcomings, this research makes a novel contribution by proposing a Comprehensive Digital Forensic Investigation Process Model (the CDFIPM), encompassing the entire digital investigative process, which is formal 1 in that it synthesizes, harmonises and extends the existing models, and which is generic in that it can be applied in the three stated fields of digital forensics. The methodology used to carry out this research is the Design Science Research widely adopted in the domain of Information Systems on the basis that it is suitable for the design and development of novel artefacts and the analysis of the performance or use of such artefacts. The Peffers et al’s (2006) Design Science Research Process model is followed during the course of this research as the appropriate selection of the Design Science Research on the basis that it is inclusive of the common elements of the previous Design Science Research studies. Existing models are critically reviewed and assessed against three different assessment criteria including: Beebe and Clark’s four-point requirement, Carrier and Spafford’s fivepoint requirement and the Daubert Test. The result of the model assessment reveals that there does not exist a model that has all the three characteristics of being “comprehensive”, “formal” and “generic”. However, through the model assessment, some models are identified that can contribute to the design and development of the proposed model. Following identification of the prevailing models, their key contributions are determined based on the assessment criteria, and the necessary components for the new model are then identified. A new set of domain-specific components is then developed in addition to the already identified components. Following identification of the necessary components and the newly developed set of domain-specific components, the outcome of the design and development stage is the proposed Comprehensive Digital Forensic Investigation Process Model, the stages of which are represented through the use of the UML Activity Diagrams. Based upon the selected methodology (the DSRP), the CDFIPM is tested through both the Demonstration and Evaluation activities. The Demonstration activity involves applying the model into various cases studies and performing a walkthrough of the model, as well as conducting a forensic laboratory experimentation. The Evaluation stage involves the independent verification and validation of the model by its intended user community, including digital forensic investigators operating within the three fields of relevance for this research, namely law enforcement, commerce and incident response, as well as experts in the domain of digital forensics, legal practitioners, a judge and researchers in both academia and industry. After feeding the results of the Evaluation stage back into the CDFIPM’s design and development stage, the model is amended accordingly

    The Advanced Data Acquisition Model (Adam): A Process Model for Digital Forensic Practice

    Get PDF
    As with other types of evidence, the courts make no presumption that digital evidence is reliable without some evidence of empirical testing in relation to the theories and techniques associated with its production. The issue of reliability means that courts pay close attention to the manner in which electronic evidence has been obtained and in particular the process in which the data is captured and stored. Previous process models have tended to focus on one particular area of digital forensic practice, such as law enforcement, and have not incorporated a formal description. We contend that this approach has prevented the establishment of generally-accepted standards and processes that are urgently needed in the domain of digital forensics. This paper presents a generic process model as a step towards developing such a generally-accepted standard for a fundamental digital forensic activity–the acquisition of digital evidence
    corecore