Академический Документы
Профессиональный Документы
Культура Документы
2
The specialized usage of modern computer
forensics has been for the most part applied directly
to efficiently prosecute a specified range of
dangerous cybercriminals
3
The
Investigation
Model
1. Acquire
2. Assess
3. Analyse
4. Report
4
Investigation Model
Below shows the investigation model, that has been broken
down to advance the case
5
Assess
Perhaps the most critical facet of successful computer
forensic investigation is a rigorous, detailed plan for
acquiring evidence. Extensive documentation is needed
prior to, during, and after the acquisition process; detailed
information must be recorded and preserved, including all
hardware and software specifications, any systems used in
the investigation process, and the systems being
investigated.
7
Analysis and Evaluation
The examiner may need to use numerous forensic tools to
acquire and analyze data residing in the machine
8
Reporting
In addition to fully documenting information related to
hardware and software specs, computer forensic
investigators must keep an accurate record of all activity
related to the investigation, including all methods used for
testing system functionality and retrieving, copying, and
storing data, as well as all actions taken to acquire, examine
and assess evidence.
9
Conclusion
Now more than ever, cybersecurity experts in this critical
role are helping government and law enforcement
agencies, corporations and private entities improve their
ability to investigate various types of online criminal activity
and face a growing array of cyber threats head-on.
IT professionals who lead computer forensic investigations
are tasked with determining specific cybersecurity needs
and effectively allocating resources to address cyber
threats and pursue perpetrators of said same.
A master’s degree in information security and assurance
has numerous practical applications that can endow IT
professionals with a strong grasp of computer forensics and
practices for upholding the chain of custody while
documenting digital evidence.
Individuals with the talent and education to successfully
manage computer forensic investigations may find
themselves in a highly advantageous position within a
dynamic career field.
10
ThankYou
Sylvester Verma, Gurpreet Singh