MITS5004 IT Security Assignment 1: Digital Forensic Evaluation Report

Verified

Added on  2022/11/28

|10
|557
|325
Presentation
AI Summary
This presentation provides an overview of digital forensic evaluation in modern criminal investigations. It discusses the increasing importance of digital forensics due to technological advancements and its application in legal proceedings. The presentation outlines various types of digital forensics, including computer, network, and mobile device forensics, along with different process models such as the extended model for cybercrime investigation and the systematic digital forensic model. It highlights the four key steps in the investigation process: collection, examination, analysis, and reporting. The advantages of using digital forensics are also explored, such as capturing important data, identifying suspects, and preventing cyber threats. The presentation concludes by emphasizing the need to adapt digital investigation processes to the emergence of new technologies.
Document Page
DIGITAL FORENSIC
EVALUATION
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
INTRODUCTION
Digital forensic is the method of retrieving and analysis of data and files
which can be obtained from the various smart phones, tablets and
computers of the suspects.
Helps in investigation and criminal proceedings.
Document Page
DIGITAL FORENSIC AS SERVICE
Use of digital forensic is increasing with the increase in the new
technology implementation in various fields.
The data and files that are recovered can be used in the legal
proceedings [4].
Document Page
TYPES OF DIGITAL FORENSIC
Computer forensic
Network forensic
Mobile device forensic
Digital image forensic
Database forensic
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
MODELS OF DIGITAL FORENSIC
Extended model for cybercrime investigation
Systematic digital forensic model
Digital forensic triage model
Document Page
PROCESS OF DIGITAL FORENSIC APPLIED
IN INVESTIGATION
The process is used in the investigation has mainly four sub-parts –
collection, examination, analysis and reporting.
Document Page
ADVANTAGES OF USING DIGITAL
FORENSIC
Helps in capturing important data present in the computers and devices which might
be helpful in the investigations
Efficiently finds out suspects and criminals from different parts of the globe.
Complicated cases like e-mail spamming and other cyber threats can be prevented by
digital forensic.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
CONCLUSION
The presentation on the digital forensic evaluation states the various
methods by which the digital forensic is used in the modern criminal
investigation processes and the various models of the digital forensic that
are applicable to the process of legal proceedings. The advantages of the
implementation of digital forensic in the modern investigations have been
discussed. Thus the process of digital investigation should be adapted with
the emergence of new technologies.
Document Page
REFERENCES
[1] C. Tassone, B. Martini, K.K.R. Choo and J. Slay. Mobile device forensics: A snapshot. Trends and Issues
in Crime and Criminal Justice, (460), p.1, 2013.
[2] D.T. Dang-Nguyen, C. Pasquini, V. Conotter and G. Boato. Raise: A raw images dataset for digital image
forensics. In Proceedings of the 6th ACM Multimedia Systems Conference (pp. 219-224). ACM, March, 2015.
[3] R. Hegarty, D.J. Lamb and A. Attwood. Digital Evidence Challenges in the Internet of Things. In INC (pp.
163-172), 2014.
[4] R.B. Van Baar, H.M.A. Van Beek and E.J. Van Eijk. Digital Forensics as a Service: A game changer.
Digital Investigation, 11, pp.S54-S62, 2014.
[5] S. Watson and A. Dehghantanha. Digital forensics: the missing piece of the internet of things promise.
Computer Fraud & Security, 2016(6), pp.5-8, 2016.
[6] T.J. Holt, A.M. Bossler and K.C. Seigfried-Spellar. Cybercrime and digital forensics: An introduction.
Routledge, 2017.
[7] V. Roussev, C. Quates, and R. Martell. Real-time digital forensics and triage. Digital Investigation, 10(2),
pp.158-167, 2013.
[8] X. Du, N.A. Le-Khac and M. Scanlon. Evaluation of digital forensic process models with respect to
digital forensics as a service. arXiv preprint arXiv:1708.01730, 2017.
Document Page
THANK YOU
chevron_up_icon
1 out of 10
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]