Purchase Solution

Cyber Forensic Investigation Stages and Investigative Techniques

Not what you're looking for?

Ask Custom Question

1) Provide detailed descriptions of each of the following 6 stages

- Preserve
- Locate
- Select
- Analyse
- Validate
- Present Evidence

2) Provide detailed descriptions for each of the following 5 investigation techniques

- File Structure
- Steganography
- Live Analysis
- Dead Analysis
- Cross Drive Analysis

Do provide me the list of URLs which information is gained or sourced or citied.

Purchase this Solution

Solution Summary

The expert examines cyber forensic investigate stages and investigative techniques.

Solution Preview

Please refer to the attached file for the response.


In this phase, the aim is to protect the computer system in such as way that tampering, data corruption, damage, and viruses are avoided. This stage also ensures that the computer system is not destroyed. Without securing or protecting the computer system, evidence obtained may not be admissible.
In this stage, the basic objective is to maintain the original data as well as to make the corresponding certified copies of the evidence.

During this stage, discovering all possible data needed that may take the form of hidden, deleted, encrypted, and password protected files is made. This phase also requires accessing or finding of relevant data. At this stage, the examiner must be aware of the types of information in the computer system and how they may be retrieved. The researcher decides on the most appropriate method of how to go about data gathering.

At this stage, the examiner/researcher applies his discretion in determining the information that will be used in the investigation. Hence this involves gathering important data fragments that are prevalent over the system. In this stage, the examiner or investigator uses his judgment in determining data that would be of significant use in the investigation. However, selection of data as well as data sources must be done in the most objective manner.


At this stage, data found are analyzed and printout of the overall analysis is made. During this phase, an overview of the computer system is made. All the information gathered are scrutinized in such a way that correct interpretation is made.
The examiner must be alert in detecting possible patterns that may surface. This could help in further explaining some aspects investigated.
In the analysis, data obtained are given meanings, ...

Solution provided by:
  • Bachelor of Science in Business Administration, University of the Philippines
  • Master in Business Administration, Saint Mary's University
  • Doctor of Philosophy in Education, University of the Philippines
  • Doctor in Business Adminstration (IP), Polytechnic University of the Philippines
Recent Feedback
  • "Excellent information thanks for the input"
  • "Thank you"
  • "Very thorough and informative. Thank you."
  • "Good response. Very detailed"
  • "This solution is excellent. Thank you"
Purchase this Solution

Free BrainMass Quizzes
Team Development Strategies

This quiz will assess your knowledge of team-building processes, learning styles, and leadership methods. Team development is essential to creating and maintaining high performing teams.

MS Word 2010-Tricky Features

These questions are based on features of the previous word versions that were easy to figure out, but now seem more hidden to me.

Organizational Leadership Quiz

This quiz prepares a person to do well when it comes to studying organizational leadership in their studies.

Employee Orientation

Test your knowledge of employee orientation with this fun and informative quiz. This quiz is meant for beginner and advanced students as well as professionals already working in the HR field.

Learning Lean

This quiz will help you understand the basic concepts of Lean.