Purchase Solution

Cyber Forensic Investigation Stages and Investigative Techniques

Not what you're looking for?

Ask Custom Question

1) Provide detailed descriptions of each of the following 6 stages

- Preserve
- Locate
- Select
- Analyse
- Validate
- Present Evidence

2) Provide detailed descriptions for each of the following 5 investigation techniques

- File Structure
- Steganography
- Live Analysis
- Dead Analysis
- Cross Drive Analysis

Do provide me the list of URLs which information is gained or sourced or citied.

Purchase this Solution

Solution Summary

The expert examines cyber forensic investigate stages and investigative techniques.

Solution Preview

Please refer to the attached file for the response.

CYBER FORENSIC INVESTIGATION: STAGES AND TECHNIQUES

STAGES
Preserve
In this phase, the aim is to protect the computer system in such as way that tampering, data corruption, damage, and viruses are avoided. This stage also ensures that the computer system is not destroyed. Without securing or protecting the computer system, evidence obtained may not be admissible.
In this stage, the basic objective is to maintain the original data as well as to make the corresponding certified copies of the evidence.

Locate
During this stage, discovering all possible data needed that may take the form of hidden, deleted, encrypted, and password protected files is made. This phase also requires accessing or finding of relevant data. At this stage, the examiner must be aware of the types of information in the computer system and how they may be retrieved. The researcher decides on the most appropriate method of how to go about data gathering.

Select
At this stage, the examiner/researcher applies his discretion in determining the information that will be used in the investigation. Hence this involves gathering important data fragments that are prevalent over the system. In this stage, the examiner or investigator uses his judgment in determining data that would be of significant use in the investigation. However, selection of data as well as data sources must be done in the most objective manner.

Analyse

At this stage, data found are analyzed and printout of the overall analysis is made. During this phase, an overview of the computer system is made. All the information gathered are scrutinized in such a way that correct interpretation is made.
The examiner must be alert in detecting possible patterns that may surface. This could help in further explaining some aspects investigated.
In the analysis, data obtained are given meanings, ...

Solution provided by:
Education
  • Bachelor of Science in Business Administration, University of the Philippines
  • Master in Business Administration, Saint Mary's University
  • Doctor of Philosophy in Education, University of the Philippines
  • Doctor in Business Adminstration (IP), Polytechnic University of the Philippines
Recent Feedback
  • "Excellent information thanks for the input"
  • "Thank you"
  • "Very thorough and informative. Thank you."
  • "Good response. Very detailed"
  • "This solution is excellent. Thank you"
Purchase this Solution


Free BrainMass Quizzes
Six Sigma for Process Improvement

A high level understanding of Six Sigma and what it is all about. This just gives you a glimpse of Six Sigma which entails more in-depth knowledge of processes and techniques.

Organizational Leadership Quiz

This quiz prepares a person to do well when it comes to studying organizational leadership in their studies.

Learning Lean

This quiz will help you understand the basic concepts of Lean.

Transformational Leadership

This quiz covers the topic of transformational leadership. Specifically, this quiz covers the theories proposed by James MacGregor Burns and Bernard Bass. Students familiar with transformational leadership should easily be able to answer the questions detailed below.

Writing Business Plans

This quiz will test your understanding of how to write good business plans, the usual components of a good plan, purposes, terms, and writing style tips.