Digital Forensics

Just an initial demo map, so that you don't start with an empty map list ...

Get Started. It's Free
or sign up with your email address
Rocket clouds
Digital Forensics by Mind Map: Digital Forensics

1. Module - VII. Digital Evidence Presentation

1.1. Admissible Digital Evidence

1.1.1. Inculpatory Evidence

1.1.2. Exculpatory Evidence

1.1.3. Evidence of Tampering

1.2. The Best Evidence Rule

1.3. Layman's Analogies

1.4. Digital Evidence- Hearsay

1.5. Authenticity & Alteration

2. Module VI

3. Module V: Forensic Examination Protocol

3.1. Forensic Scinence – The Applcation of Science to law

3.2. It utilized for Identifying, recovering, reconstructing or analyzing evidence during a criminal and civil investigation.

3.3. It diverges from traditional area because of rate of advancement of technologies

3.4. Analyze available evidence Create hypothesis,Perform test This process will lead to Strong possibility about what have occurred

3.5. Cardinal Rules of Digital forensic

3.5.1. Never mishandled Evidence

3.5.2. Never work on original evidence

3.5.3. Never trust the system Document

3.5.4. Document all action.

3.6. Alpha 5

3.6.1. Assessment

3.6.2. Acquisition

3.6.3. Authentication - may use MD5, SHA1

3.6.4. Analysis & Reporting

3.6.5. Archives

3.7. Keyword search is the most important aspect of digital forensic

3.8. Examine executable files & run suspicious application in a standalone environment

4. Module II: Digital Incident Response

4.1. Digital Incident Assessment

4.1.1. Type of Inicident Upon notification of an incident, you must determine the following on the digital device involved:a) whether it is considered to be "Contraband" or "the fruits of the crime" of the offence. b) does it contain evidence of the incident or the offence. c) was used as a tool of the offence. d) was used as a stotrage device

4.1.2. Parties Involved Complainants Victims Witnesses Informants Suspects

4.1.3. Incident/ Equipements

4.1.4. Available Response Resources

4.2. Securing Digital Evidence

4.3. Chain of Custody

5. Module I: Computer Forensic Incidents

5.1. The Legal System

5.2. Criminal Incidents

5.2.1. Types Identity Theft Telecommunications fraud Online Auction Fraud Trafficking in Contraband Network Intrusions Cyber Threats Pirating Intellectual Property

5.3. Civil Incidents

5.3.1. Types Theft of Proprietory Data Misuse of Corporate IT assets Sexual Harassment Lawsuits Compliance wit SOX Compliance with Gramm-Leach-Biley Act

5.4. Internal Threat

5.4.1. Employee wrongful termination lawsuits

5.5. External Threat

5.6. Investigative Challenges

5.7. Comp Fraud

6. Module IV - Digital Evidence Protocol

6.1. Digital Forensic Science tool, technique, Approach, analysis and Process the digital evidence

6.1.1. These evidence help reconstruct the Incident

6.1.2. Proof in court of Law

6.2. Data File – Active Data, Archival data, Backup Data, Residual Data (Free Space, File Slack, RAM Slack, Swap Files, Temp File, Unallocated Space, E-Mail, Background Data (Audit Trail, Access control, Metadata)

6.2.1. Active Data word, spreadsheet, datbase Photographs, calander

6.2.2. Archival Data Not an active data but is stored in fee Space on HDD, media

6.2.3. Backup data Data copied in safe area/media Win95/98 - c:\windows\sysbackp\ WinNT/XP/2K - c:\document setting\username\ntuser.dat

6.2.4. Residual Data May be deleted file on file structure RAM, File Slack (unallocated cluster space), swap file (hidden), temp file, unallocated space

6.3. The Court and Rule of Evidence – US Federal Rules of Procedure (Data compaliation, Data Duplication/Authentication by Expert

6.3.1. Data Compilation

6.3.2. Information Discoverable

6.3.3. Verification/validation, Standard followed

7. Module III - OS /Disk Storage Concepts

7.1. Disk Based Operating System

7.1.1. DOS DOS 1.x DOS 2.x DOS 3.x DOS 6.x DOS 6.22 DOS 7.0 DOS 7.1

7.1.2. FAT FAT 12 FAT 16 VFAT FAT32

7.1.3. NTFS

7.2. OS File Storage Concepts

7.3. Disk Storage Concepts

7.4. Slack Space

7.5. File Management

7.6. File Formats