logo

Digital Forensic Fundamentals: Roles, Responsibilities, Hardware and Software

   

Added on  2023-05-26

20 Pages3723 Words154 Views
 | 
 | 
 | 
Running head: DIGITAL FORENSIC FUNDAMENTALS
DIGITAL FORENSIC FUNDAMENTALS
Name of the Student
Name of the University
Authors note
Digital Forensic Fundamentals: Roles, Responsibilities, Hardware and Software_1

1DIGITAL FORENSIC FUNDAMENTALS
Table of Contents
Introduction................................................................................................................................2
Business Case.............................................................................................................................2
Potential customers and recent cybercrimes..............................................................3
Computer Forensic Workstation................................................................................................3
Roles, responsibilities................................................................................................3
Hardware....................................................................................................................3
Software.....................................................................................................................5
Accreditation and License requirements....................................................................7
Lab security................................................................................................................8
Facility Management..................................................................................................9
SOP............................................................................................................................9
Conclusion................................................................................................................................13
Digital Forensic Fundamentals: Roles, Responsibilities, Hardware and Software_2

2DIGITAL FORENSIC FUNDAMENTALS
Part A
Introduction
Digital forensics emerged in response to rise of the digital or cybercrimes that are
committed using the of different information systems/computer systems either as instrument
used for the crime an or a victim/target for the committed crime. Digital Forensic
professionals are mainly responsible for solve the cases in which an intruder or suspect has
committed a digital crime while exploring the attacker or culprit legally using the different
standard methodologies.
Digital evidence such as hard drives, other storage devices, internet footprints has a
prominent importance in the whole scenario. Since all the investigative are conducted on the
collected evidence. This kind of evidence might be tampered in different manners which
leads to the failure of whole investigation. As the digital evidence are mainly in the form of
binary data thus it can be created, communicated as well as manipulated from or to any
device for the sake of investigation. In this mean time being a fragile in nature element
(digitally acquired evidence) thus can be easily damaged, destroyed as well as altered in case
of the communication channel is eavesdropped and is available to any attacker or suspect.
Business Case
Different information frameworks are attacked/reached by utilizing different digital
devices and systems in order to commit the crimes as well as hide their digital identity or foot
prints, making new challenges for the investigators. Malicious applications or codes that are
used to exploit the other system vulnerabilities additionally acts as obstacles to the digital
forensic investigators.
Digital Forensic Fundamentals: Roles, Responsibilities, Hardware and Software_3

3DIGITAL FORENSIC FUNDAMENTALS
Since the devices such as PCs and systems are utilized by individuals, organization or
investigators, pernicious projects and practices that may taint the integrity of the evidences
can prompt to the loss of the acquired data.
Recent cybercrimes
Spamming is about sending spontaneous messages to numerous clients at once,
potentially up to thousands, with the typical expectation of promoting items to potential
clients. Spamming can additionally be utilized as a type of disturbance by singling out an
email address and sending the proprietor of that address several messages for each second.
Spamming is normally arbitrary and untargeted yet it tends to be directed to either a gathering
of individuals, for instance, ads that provide food for a specific gathering of individuals.
Virus and malwares
Virus is a program that defiles executable records. The executable record capacities
are adjusted once tainted by an infection. The progressions can happen in numerous
structures, for example, the way toward showing undesirable message or the way toward
erasing documents haphazardly without the client's endorsement. However, these undesired
moves possibly make put when the executable document is run. Some infections are
innocuous and engaging to their beneficiaries while the dominant part cause real harm to the
vault, documents, or even equipment. Conversely, worms are programs that duplicate
themselves. The contrast between an infection and a worm is that an infection is never
duplicates itself; it is replicated just when the executable document is run
Digital Forensic Fundamentals: Roles, Responsibilities, Hardware and Software_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Digital Forensic: An Overview of the Application, Tools, and Future
|12
|572
|328

Digital Forensics: Incidents, Incident Response Measures, Legislation and Regulations
|14
|4347
|379