University Assignment: Digital Forensic and its Implementation Report
VerifiedAdded on  2022/11/28
|9
|2179
|485
Report
AI Summary
This report provides a detailed exploration of digital forensics, emphasizing its role in criminal investigations and legal proceedings. It begins with an executive summary outlining the core concepts, including the collection and analysis of data from suspects' devices. The report then delves into the significance of digital forensics in the context of evolving technology and its increasing importance in modern investigations, particularly with the rise of cloud computing. It discusses digital forensics as a service (DFaaS) and its benefits, along with the various types of digital forensics, such as computer, mobile device, network, and digital image forensics. The report further examines different digital forensic models, including those for cybercrime investigation, triage processes, and systematic investigations, as well as recent research focusing on data mining, cloud computing, and IoT integration. The advantages of using digital forensics are highlighted, emphasizing its effectiveness in data collection, remote access, and its adaptability to new technologies. The report concludes by underscoring the evolving nature of digital forensics and the need for continuous improvement and adaptation to new technologies in investigation procedures. The references are provided at the end of the report.

Running head: DIGITAL FORENSIC AND ITS IMPLEMENTATION
DIGITAL FORENSIC EVALUATION
[Enter Name of the Student:]
[Enter Name of the University:]
[Author Note:]
DIGITAL FORENSIC EVALUATION
[Enter Name of the Student:]
[Enter Name of the University:]
[Author Note:]
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

DIGITAL FORENSIC AND ITS IMPLEMENTATION
EXECUTIVE SUMMARY
The digital forensic is the collection and analysis of the various files and data of the suspect
which helps in the criminal proceedings and investigations. The report describes the various
models of the digital forensics and its advantages on using it. The various tools and techniques
used for the implementation of the digital forensic is also described.
1
Name
Student ID
EXECUTIVE SUMMARY
The digital forensic is the collection and analysis of the various files and data of the suspect
which helps in the criminal proceedings and investigations. The report describes the various
models of the digital forensics and its advantages on using it. The various tools and techniques
used for the implementation of the digital forensic is also described.
1
Name
Student ID

DIGITAL FORENSIC AND ITS IMPLEMENTATION
Table of Contents
Introduction......................................................................................................................................3
Discussion........................................................................................................................................3
Digital forensic as a service.........................................................................................................3
Digital forensic types...................................................................................................................3
Various models for Digital Forensic............................................................................................4
Recent research on the digital forensic process models:.............................................................5
Advantages of using the digital forensics:...................................................................................6
Conclusion.......................................................................................................................................6
References........................................................................................................................................7
2
Name
Student ID
Table of Contents
Introduction......................................................................................................................................3
Discussion........................................................................................................................................3
Digital forensic as a service.........................................................................................................3
Digital forensic types...................................................................................................................3
Various models for Digital Forensic............................................................................................4
Recent research on the digital forensic process models:.............................................................5
Advantages of using the digital forensics:...................................................................................6
Conclusion.......................................................................................................................................6
References........................................................................................................................................7
2
Name
Student ID
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

DIGITAL FORENSIC AND ITS IMPLEMENTATION
Introduction
The digital forensic has become one of the most significant tools with the evaluation of
technology and it also used in the investigation of criminal activity. The digital forensics
comprises of the data and files of the criminals by which they can be identified and these files
and data are obtained from the various devices of the suspect such as digital wearable, smart
phones, tablets and data stored in the clouds. With digital technology increasing across the globe,
the use of digital forensic is also increasing and in many cases the need for the investigation of
the digital devices is also increasing [10]. The report emphasizes on the various techniques in the
evaluation of the digital forensic and how the digital forensic is used in the criminal
investigations and what factors are responsible for the framework of such a technology. The new
tools and methods that are being implemented in the cases of digital forensic are also discussed
in the report.
Discussion
Digital forensic as a service
The digital forensic is considered to be the process of identifying the data and files that
are related to the suspect and these files and data are used for the criminal investigation
processes. The use of cloud computing and the various organizations shifting their data to the
cloud based services have made the use of digital forensic more significant in the recent days and
the DFaaS can also increase the scope for the analysis of such data [5]. With the application of
the digital forensic, the crucial data and files that are recovered can be used in the court of law as
evidence. However, the analysis of the digital data and files should be done carefully as because
there lies the chances of data duplicity and spoofed data. The implementation of digital forensic
in investigation is also a result of the adaptation of DFaaS and it is beneficial for the legal
proceedings as well. Thus the digital forensic as a service is very much needed and important in
the modern day digital data analysis and criminal investigation proceedings [7].
Digital forensic types
The digital forensic implementation have different types which are used and implemented
with respect to the needs of it and the models are described below –
3
Name
Student ID
Introduction
The digital forensic has become one of the most significant tools with the evaluation of
technology and it also used in the investigation of criminal activity. The digital forensics
comprises of the data and files of the criminals by which they can be identified and these files
and data are obtained from the various devices of the suspect such as digital wearable, smart
phones, tablets and data stored in the clouds. With digital technology increasing across the globe,
the use of digital forensic is also increasing and in many cases the need for the investigation of
the digital devices is also increasing [10]. The report emphasizes on the various techniques in the
evaluation of the digital forensic and how the digital forensic is used in the criminal
investigations and what factors are responsible for the framework of such a technology. The new
tools and methods that are being implemented in the cases of digital forensic are also discussed
in the report.
Discussion
Digital forensic as a service
The digital forensic is considered to be the process of identifying the data and files that
are related to the suspect and these files and data are used for the criminal investigation
processes. The use of cloud computing and the various organizations shifting their data to the
cloud based services have made the use of digital forensic more significant in the recent days and
the DFaaS can also increase the scope for the analysis of such data [5]. With the application of
the digital forensic, the crucial data and files that are recovered can be used in the court of law as
evidence. However, the analysis of the digital data and files should be done carefully as because
there lies the chances of data duplicity and spoofed data. The implementation of digital forensic
in investigation is also a result of the adaptation of DFaaS and it is beneficial for the legal
proceedings as well. Thus the digital forensic as a service is very much needed and important in
the modern day digital data analysis and criminal investigation proceedings [7].
Digital forensic types
The digital forensic implementation have different types which are used and implemented
with respect to the needs of it and the models are described below –
3
Name
Student ID
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

DIGITAL FORENSIC AND ITS IMPLEMENTATION
Computer forensic: The files and data found on the laptops, computers and other storage
media and the analysis and identification of such evidence is termed as computer forensic and
these are used very often in the legal proceedings and criminal investigation [4].
Mobile device forensic: The digital mobile device forensic is the analysis of the data
obtained from the mobile, tablet, personal gadgets and sim cards [1].
Network forensic: The monitoring, analysis and capturing of the various network
frameworks in order to investigate any security threats and intrusions such as virus attack or
malware attacks or other types of security breaches which might affect the files and data of a
system.
Digital image forensic: The process of extracting the digital images and videos which
might be considered as evidence in a criminal proceeding is known as digital image forensic and
it is the most frequent used model in digital forensic investigation cases [2].
Various models for Digital Forensic
The various models of digital forensic are based on the broad range of its uses and the
typical cases of the law enforcement [3]. The various models on the basis of the use of digital
forensic in the various sectors are described below –
Extended model for cybercrime investigation: The use of the digital forensic is mainly
needed and used in the criminal investigation proceedings and the proposed model is based on
the waterfall fashion and the activities which are necessary for the digital forensic are done in a
sequence.
Digital forensic triage process model: In the criminal proceedings of kidnaps and
murder, the data and files are often required to be extracted from the various devices
immediately so that the criminals do not have the scope of escaping in other countries [11]. The
traditional investigation processes lacks use of proper technology and thus the forensic triage
process is proposed which generally deals with the first few hours of the investigation and also
helps in identifying the criminal.
4
Name
Student ID
Computer forensic: The files and data found on the laptops, computers and other storage
media and the analysis and identification of such evidence is termed as computer forensic and
these are used very often in the legal proceedings and criminal investigation [4].
Mobile device forensic: The digital mobile device forensic is the analysis of the data
obtained from the mobile, tablet, personal gadgets and sim cards [1].
Network forensic: The monitoring, analysis and capturing of the various network
frameworks in order to investigate any security threats and intrusions such as virus attack or
malware attacks or other types of security breaches which might affect the files and data of a
system.
Digital image forensic: The process of extracting the digital images and videos which
might be considered as evidence in a criminal proceeding is known as digital image forensic and
it is the most frequent used model in digital forensic investigation cases [2].
Various models for Digital Forensic
The various models of digital forensic are based on the broad range of its uses and the
typical cases of the law enforcement [3]. The various models on the basis of the use of digital
forensic in the various sectors are described below –
Extended model for cybercrime investigation: The use of the digital forensic is mainly
needed and used in the criminal investigation proceedings and the proposed model is based on
the waterfall fashion and the activities which are necessary for the digital forensic are done in a
sequence.
Digital forensic triage process model: In the criminal proceedings of kidnaps and
murder, the data and files are often required to be extracted from the various devices
immediately so that the criminals do not have the scope of escaping in other countries [11]. The
traditional investigation processes lacks use of proper technology and thus the forensic triage
process is proposed which generally deals with the first few hours of the investigation and also
helps in identifying the criminal.
4
Name
Student ID

DIGITAL FORENSIC AND ITS IMPLEMENTATION
Systematic Digital forensic investigation model: The systematic investigation model
for digital forensic which helps in the construction of evidence and frauds in the cybercrime. The
models proposed for the digital forensic also deals with the types of investigations in the domain
of digital crime investigation and various techniques are used in order to obtain the crucial
evidences using digital forensic methods [1].
Recent research on the digital forensic process models:
The field of digital forensic is evolving along with the new technologies and information
technology tools that are being used by the criminals and various storage devices and digital
devices, however, the recent researches in the digital forensic field is related to the new
technology implementation in the field such as data mining and cloud computing framework.
The internet of things is also another important tool used for the digital forensic and criminal
investigation purpose of the criminal proceedings.
Digital forensic framework for cloud computing: The various models of cloud
computing is adapted by various organizations and accessing those cloud storages in order to
retrieve the files and data is a very complex process for the developer of digital forensic. The
important login credentials of the suspect are stored in the cloud storage and accessing those are
data are difficult and the investigators also face the problem in seizing those evidence as because
the entire database cannot be seized in certain circumstances [9]. There might be also possibility
that the server that is being investigated is located in another country and jurisdiction and thus
the investigators cannot access it. However, the recent digital forensic model for cloud
computing framework helps in the investigation and retrieval of data that is mainly located in the
various cloud based storage systems.
Data mining framework: The process of digital forensic requires faster collection of the
data, research, intelligence and management of the data. The preservation and analysis of the
collected data is becoming difficult as because the amount of data is increasing day by day and it
is also utilizing data reduction and conducts data mining [12]. The use of data mining in the field
of digital forensic has certain benefits and for the investigation processes such as triage devices
and media, helps in the faster indexing process and helps in the cross-case analysis.
5
Name
Student ID
Systematic Digital forensic investigation model: The systematic investigation model
for digital forensic which helps in the construction of evidence and frauds in the cybercrime. The
models proposed for the digital forensic also deals with the types of investigations in the domain
of digital crime investigation and various techniques are used in order to obtain the crucial
evidences using digital forensic methods [1].
Recent research on the digital forensic process models:
The field of digital forensic is evolving along with the new technologies and information
technology tools that are being used by the criminals and various storage devices and digital
devices, however, the recent researches in the digital forensic field is related to the new
technology implementation in the field such as data mining and cloud computing framework.
The internet of things is also another important tool used for the digital forensic and criminal
investigation purpose of the criminal proceedings.
Digital forensic framework for cloud computing: The various models of cloud
computing is adapted by various organizations and accessing those cloud storages in order to
retrieve the files and data is a very complex process for the developer of digital forensic. The
important login credentials of the suspect are stored in the cloud storage and accessing those are
data are difficult and the investigators also face the problem in seizing those evidence as because
the entire database cannot be seized in certain circumstances [9]. There might be also possibility
that the server that is being investigated is located in another country and jurisdiction and thus
the investigators cannot access it. However, the recent digital forensic model for cloud
computing framework helps in the investigation and retrieval of data that is mainly located in the
various cloud based storage systems.
Data mining framework: The process of digital forensic requires faster collection of the
data, research, intelligence and management of the data. The preservation and analysis of the
collected data is becoming difficult as because the amount of data is increasing day by day and it
is also utilizing data reduction and conducts data mining [12]. The use of data mining in the field
of digital forensic has certain benefits and for the investigation processes such as triage devices
and media, helps in the faster indexing process and helps in the cross-case analysis.
5
Name
Student ID
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

DIGITAL FORENSIC AND ITS IMPLEMENTATION
Digital forensic model based on IoT: This is a more sophisticated model for the digital
forensic investigation and it uses huge volume of the digital data, analyses the data and the
storage devices as well [6]. The standard operating procedure for investigation using the IoT
(internet of things) is described and defined.
Advantages of using the digital forensics:
The digital forensic is used in the various fields as because of the growing of digital data
in every field and it is also regarded as a complete process for the extraction and collection of
data from the various devices and storage facilities of the suspects. The collection of data from
the various cloud based storage systems and with the help of these data criminal proceedings can
be performed in a more practical and logical way [8]. The access of the data are also done
remotely by the various models of the digital forensic and thus the use of such data is needed.
The digital forensic as a service thus facilitates the use of new technologies and it also helps in
the future enhancement of the digital forensic investigation. The new tools and techniques that
are being used in the field of the unstructured and structured data science is also applicable and
usable in the investigations of digital forensic. Thus the use of digital forensic is increasing with
the increase in technology and cloud based storage systems and various criminal investigations
and legal proceedings are being benefitted by the use of digital forensic and its continuous
evaluation.
Conclusion
The digital forensic is the analysis and detection of the various files and data of the
suspect which can be used in the future as evidence in the criminal proceedings. The use of
digital forensic and its application as a service is described in the report. The various models of
the digital forensic that are applicable and the various types by which the entire field of the
digital forensic operates is also described in the report. The digital forensic and its evaluation is
necessary in the modern field of cloud based storage systems thus its application is effective in
the legal proceedings. Thus it can be concluded that digital forensic is an evolving field in the
modern technological field and the various techniques used in the analysis and collection of the
data are effective and helps in the investigation procedures and hence the digital forensic
methods should be adapted by the legal bodies. However, the future of the digital forensic is
6
Name
Student ID
Digital forensic model based on IoT: This is a more sophisticated model for the digital
forensic investigation and it uses huge volume of the digital data, analyses the data and the
storage devices as well [6]. The standard operating procedure for investigation using the IoT
(internet of things) is described and defined.
Advantages of using the digital forensics:
The digital forensic is used in the various fields as because of the growing of digital data
in every field and it is also regarded as a complete process for the extraction and collection of
data from the various devices and storage facilities of the suspects. The collection of data from
the various cloud based storage systems and with the help of these data criminal proceedings can
be performed in a more practical and logical way [8]. The access of the data are also done
remotely by the various models of the digital forensic and thus the use of such data is needed.
The digital forensic as a service thus facilitates the use of new technologies and it also helps in
the future enhancement of the digital forensic investigation. The new tools and techniques that
are being used in the field of the unstructured and structured data science is also applicable and
usable in the investigations of digital forensic. Thus the use of digital forensic is increasing with
the increase in technology and cloud based storage systems and various criminal investigations
and legal proceedings are being benefitted by the use of digital forensic and its continuous
evaluation.
Conclusion
The digital forensic is the analysis and detection of the various files and data of the
suspect which can be used in the future as evidence in the criminal proceedings. The use of
digital forensic and its application as a service is described in the report. The various models of
the digital forensic that are applicable and the various types by which the entire field of the
digital forensic operates is also described in the report. The digital forensic and its evaluation is
necessary in the modern field of cloud based storage systems thus its application is effective in
the legal proceedings. Thus it can be concluded that digital forensic is an evolving field in the
modern technological field and the various techniques used in the analysis and collection of the
data are effective and helps in the investigation procedures and hence the digital forensic
methods should be adapted by the legal bodies. However, the future of the digital forensic is
6
Name
Student ID
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

DIGITAL FORENSIC AND ITS IMPLEMENTATION
based upon the improvement of the investigation processes and incorporating the new
technologies in the field.
References
[1] C. Tassone, B. Martini, K.K.R. Choo and J. Slay. Mobile device forensics: A snapshot.
Trends and Issues in Crime and Criminal Justice, (460), p.1, 2013.
[2] D.T. Dang-Nguyen, C. Pasquini, V. Conotter and G. Boato. Raise: A raw images dataset for
digital image forensics. In Proceedings of the 6th ACM Multimedia Systems Conference (pp.
219-224). ACM, March, 2015.
[3] F. Jafari and R.S. Satti. Comparative analysis of digital forensic models. Journal of Advances
in Computer Networks, 3(1), pp.82-86, 2015.
[4] M. Damshenas, A. Dehghantanha and R. Mahmoud. A survey on digital forensics trends.
International Journal of Cyber-Security and Digital Forensics, 3(4), pp.209-235, 2014.
[5] M.D. Kohn, M.M. Eloff and J.H. Eloff. Integrated digital forensic process model. Computers
& Security, 38, pp.103-115, 2013.
[6] R. Hegarty, D.J. Lamb and A. Attwood. Digital Evidence Challenges in the Internet of
Things. In INC (pp. 163-172), 2014.
[7] R.B. Van Baar, H.M.A. Van Beek and E.J. Van Eijk. Digital Forensics as a Service: A game
changer. Digital Investigation, 11, pp.S54-S62, 2014.
[8] S. Watson and A. Dehghantanha. Digital forensics: the missing piece of the internet of things
promise. Computer Fraud & Security, 2016(6), pp.5-8, 2016.
[9] S. Zawoad and R. Hasan. Digital forensics in the cloud. ALABAMA UNIV IN
BIRMINGHAM, 2013.
7
Name
Student ID
based upon the improvement of the investigation processes and incorporating the new
technologies in the field.
References
[1] C. Tassone, B. Martini, K.K.R. Choo and J. Slay. Mobile device forensics: A snapshot.
Trends and Issues in Crime and Criminal Justice, (460), p.1, 2013.
[2] D.T. Dang-Nguyen, C. Pasquini, V. Conotter and G. Boato. Raise: A raw images dataset for
digital image forensics. In Proceedings of the 6th ACM Multimedia Systems Conference (pp.
219-224). ACM, March, 2015.
[3] F. Jafari and R.S. Satti. Comparative analysis of digital forensic models. Journal of Advances
in Computer Networks, 3(1), pp.82-86, 2015.
[4] M. Damshenas, A. Dehghantanha and R. Mahmoud. A survey on digital forensics trends.
International Journal of Cyber-Security and Digital Forensics, 3(4), pp.209-235, 2014.
[5] M.D. Kohn, M.M. Eloff and J.H. Eloff. Integrated digital forensic process model. Computers
& Security, 38, pp.103-115, 2013.
[6] R. Hegarty, D.J. Lamb and A. Attwood. Digital Evidence Challenges in the Internet of
Things. In INC (pp. 163-172), 2014.
[7] R.B. Van Baar, H.M.A. Van Beek and E.J. Van Eijk. Digital Forensics as a Service: A game
changer. Digital Investigation, 11, pp.S54-S62, 2014.
[8] S. Watson and A. Dehghantanha. Digital forensics: the missing piece of the internet of things
promise. Computer Fraud & Security, 2016(6), pp.5-8, 2016.
[9] S. Zawoad and R. Hasan. Digital forensics in the cloud. ALABAMA UNIV IN
BIRMINGHAM, 2013.
7
Name
Student ID

DIGITAL FORENSIC AND ITS IMPLEMENTATION
[10] T.J. Holt, A.M. Bossler and K.C. Seigfried-Spellar. Cybercrime and digital forensics: An
introduction. Routledge, 2017.
[11] V. Roussev, C. Quates, and R. Martell. Real-time digital forensics and triage. Digital
Investigation, 10(2), pp.158-167, 2013.
[12] X. Du, N.A. Le-Khac and M. Scanlon. Evaluation of digital forensic process models with
respect to digital forensics as a service. arXiv preprint arXiv:1708.01730, 2017.
8
Name
Student ID
[10] T.J. Holt, A.M. Bossler and K.C. Seigfried-Spellar. Cybercrime and digital forensics: An
introduction. Routledge, 2017.
[11] V. Roussev, C. Quates, and R. Martell. Real-time digital forensics and triage. Digital
Investigation, 10(2), pp.158-167, 2013.
[12] X. Du, N.A. Le-Khac and M. Scanlon. Evaluation of digital forensic process models with
respect to digital forensics as a service. arXiv preprint arXiv:1708.01730, 2017.
8
Name
Student ID
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 9
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
 +13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.