Digital Forensics and Incident Response Analysis Report

Verified

Added on  2022/08/31

|5
|780
|22
Report
AI Summary
Read More
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: DIGITAL FORENSICS
Digital Forensics: Forensics and Incident Response
Name of the Student
Name of the University
Author Note
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1DIGITAL FORENSICS
Introduction
The branch of forensic science that mostly deals with recovery and investigation of
digital data and other Digital information materials found within a particular digital device is
known as digital forensics. On the other hand, incident response is a particular event which
heads into the loss of operations within an organisation that is usually led by cyber-criminal
activities which is detected with the help of digital forensics (Spring and Pym 2018).
Following would be the description of the method of digital forensics for incident response
with critical reflection to the method.
Description of the method
The uncovering of digital crime is ideally done with the help of digital forensics. The
recovery of stolen digital data is possible with the help of Digital forensic so that any
identification or recovery of criminal activity over cyber world can be detected (Englbrecht
et al. 2019). Both incident response and digital forensics are two extremely important part of
information security as there have been numerous cases of cyber security violation over the
last few years. While the Digital forensic process is mostly divided into three procedures,
incident response offers expert guidance to deal with an accounting incident.
The first step of Digital forensic begins with capturing of the original digital evidence
and having a forensic image made. There are several copies of the incident created for several
investigators to walk on the incident (Daily 2019). It would minimise the chances of
modifying the original evidence.
The next step is to copy the authenticated evidences and then verification by the
investigators to find out if the copy made for the original evidence is an exact replica.
Document Page
2DIGITAL FORENSICS
Last leader digital copy gets evaluated so that specific procedures during the entire
investigation is investigated for analysing the prince and circumstances under which the
investigation is operating.
Where, on the other hand, incident response make sure that the application within a
digital device is built in such a way that would always provide an expert guidance for the
users to go through comprehensive approaches with cross functional abilities that would
prevent the digital devices to fall into such malicious attacks in future (Campbell 2016).
Critical Reflection of the method
Procedure of Digital forensic is what I believed to be one of the most important
aspects to investigate and find out the activities of Cyber criminals. To find out the digital
evidences of malicious activities dance from a machine or to a machine is extremely
necessary with the help of digital forensics method. On the other hand, I also believe that the
incident response is complementary with digital forensics as while one of the procedures
finds out the malicious activities which is evidence all over digital device, The Other
procedure helps organisations to understand the responsibility that they have in preventing
such incidences further. If incident response is implemented properly within an organisation
there would be ready to take any action to prevent the incidences or take activities
themselves, which means are there would be no requirement of digital forensics as malicious
attacks will not occur thereafter.
Conclusion
Therefore, in conclusion it can be said that the differences between Digital forensic
and incident response is actually complementary methods that make sure how a cyber-
criminal activity can be detected and how they can be prevented further respectively. Both
Document Page
3DIGITAL FORENSICS
the procedures and their methods have been represented as above with a critical reflection on
both these methods.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4DIGITAL FORENSICS
References
Campbell, T., 2016. Digital Evidence and Incident Response. In Practical Information
Security Management (pp. 179-191). Apress, Berkeley, CA.
Daily, J.S., 2019, March. Cybersecurity Aspects of Heavy Vehicle Digital Forensics.
In Proceedings of the ACM Workshop on Automotive Cybersecurity (pp. 1-1).
Englbrecht, L., Langner, G., Pernul, G. and Quirchmayr, G., 2019, August. Enhancing
credibility of digital evidence through provenance-based incident response handling.
In Proceedings of the 14th International Conference on Availability, Reliability and
Security (pp. 1-6).
Spring, J.M. and Pym, D., 2018, October. Towards Scientific Incident Response.
In International Conference on Decision and Game Theory for Security (pp. 398-417).
Springer, Cham.
chevron_up_icon
1 out of 5
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]