Startertutorials Blog
Tutorials and articles related to programming, computer science, technology and others.
Subscribe to Startertutorials.com's YouTube channel for different tutorial and lecture videos.
Home » Security and Hacking » Approaching a Computer Forensics Investigation
Suryateja Pericherla Categories: Security and Hacking. No Comments on Approaching a Computer Forensics Investigation
5
(1)

In this article we will look at what is the process in approaching a computer forensics investigation.

 

The phases in a computer forensics investigation are:

  • Secure the subject system
  • Take a copy of hard drive/disk
  • Identify and recover all files
  • Access/view/copy hidden, protected, and temp files
  • Study special areas on the drive
  • Investigate the settings and any data from programs on the system
  • Consider the system from various perspectives
  • Create detailed report containing an assessment of the data and information collected

 

Watch this video on approaching a computer forensics inverstigation

 

Things to be avoided during forensics investigation:


Subscribe to our monthly newsletter. Get notified about latest articles, offers and contests.


  • Changing date/timestamps of the files
  • Overwriting unallocated space

 

Things that should not be avoided during forensics investigation:

  • Engagement contract
  • Non-Disclosure Agreement (NDA)

 

Elements addressed before drawing up a forensics investigation engagement contract:

  • Authorization
  • Confidentiality
  • Payment
  • Consent and acknowledgement
  • Limitation of liability

 

General steps in solving a computer forensics case are:

  • Prepare for the forensic examination
  • Talk to key people about the case and what you are looking for
  • Start assembling tools to collect the data and identify the target media
  • Collect the data from the target media
  • Use a write blocking tool while performing imaging of the disk
  • Check emails records too while collecting evidence
  • Examine the collected evidence on the image that is created
  • Analyze the evidence
  • Report your finding to your client

 

How useful was this post?

Click on a star to rate it!

We are sorry that this post was not useful for you!

Let us improve this post!

Tell us how we can improve this post?

Leave a Reply

Your email address will not be published. Required fields are marked *

Facebook
Twitter
Pinterest
Youtube
Instagram
Blogarama - Blog Directory