Discuss about the Digital Forensics for Digital Evidence Storage and Preservation.
Nowadays the use of the digital technology is everywhere. In the area of the evidence storage and prevention, use of the digital technology is very popular in the recent time. In the context of the digital data, two concepts, cultural data and personal data is very important. It has been observed that the most of the people consider the digital forensic as one of the primary factor of the investigation of crime (Casey et al. 224). However, the practice of the digital evidence storage and protection is used in various sectors. It is providing lots of facilities for investigating and protecting the data from the past time. Forensic computing and computer forensics are seen as similar two technologies by the users, and can be distinguished from computational forensics, which is directed at the use of computing technology in forensics generally (Ashcroft, Daniels and Hart). Digital forensics is an extension of computer forensics, incorporating not only computers but any digital electronic technology, from mobile phones to printers.
In this research project, the applications of the chosen technology will be investigated. The benefits, challenges and other important factors associated with the research area will be investigated and analyzed in this research study.
Aims and Objectives:
The main aim of this research study is to find out the effectiveness of the applications of the digital evidence based practices in the various areas.
The objectives of the research study will be the followings:
- To understand the different types of applications of the digital evidence based practices
- To analyze the effectiveness of the different types of available uses of the digital evidence storage and protection
- To understand the potential challenged associated with the use of the digital evidence practices in the different areas
- To provide some suitable suggestion for the proper use of the digital evidence storage and protection systems
Justification Behind the Selection of this Topic:
The chosen topic is about an updated technology which is very popular and currently using in many sectors. The digital technology is very helpful for the evidence storing and protection, but the technical tools should be used in proper way (Loren and Mercer). The research work in this topic will help to understand the different types of uses of the technology in the concerned field.
The use of digital forensic helps in the authentication of the evidence using various biometric tools and cryptographic token. The digital evidence helps in maintaining the integrity and control the access of the documents of forensic files that helps in improving the accuracy and authenticity of the information (Hosmer, Chet). Therefore, the undertake study will help in evaluating the significant process for preserving the digital evidence.
"Digital Evidence: How It’S Done” exclaimed that the analysis of the digital evidence needed to be conducted by a specialised person who have been trained in the particular area. It has been difficult for the local law enforcement to keep track of the number of electronic devices and technologies currently in use.
The digital forensic has changed the environment of the various types of forensic investigations in a dramatic way. The research work will help to understand the different types of changes introduced in the area of the forensic investigations (John, Daniels, and Hart). The idea regarding the upcoming updates of the forensic investigations also can be analyzed by forecasting the technical facilities associated with the digital forensic.
The main areas that will be covered in the research study are application of the digital evidence storage and prevention in cultural heritage, academic research, crime investigation and storing the personal archives.
The research study will be contributed in two major areas; one is the area of the academic research area and the other is the organizations that are using the technology. The results of the research study will help the future academic researchers to use these as the empirical data.
In case of different crimes, the conducted study will help the investigators to evaluate to obtained the required information in right time for targeting the pre-and post crim information from the devices used during the crime. “Digital Evidence: A Short Guide – Irecord” cited that in many cases, the evidence collected in the forensic investigation are ether lost or damaged. Evaluating the particular process for sharing and storing information in a secure manner will assist the law enforcement in preventing the “break” in the chain of custody.
The business organizations will understand the various types of uses of the digital evidence storing and protection in efficient ways. At the end of the research study, some recommendations will also be given which will help the organizations to find out the better ways of utilizing the digital technology for string and protecting the evidences.
In order to use the digital evidence the design of the proper equipments is essential. Some common forms of the digital evidences are CCTV footage, text messages, emails, media files (image, audio, video), spreadsheets, message logs, history records etc. The tools of the information technology (computers and internet connections) are the essential parts of using the digital evidences in forensic investigations. In the designing step a useful database management system need to be developed for the effective level of digital evidence handling. Use of the DVD, CD, floppy disk and USB sticks are very common for the collection of the digital evidences from one computer system to another. It’s just treated like a digital data.
There are lots of different areas where the digital evidences are required regarding the forensic investigations. In this context, the involvement of proper expert who is well aware about the type of data needed to be handled is required.
According to Marshall and Angus, there are two types of systems that can be used for the digital evidence handling. They are open system and closed system. In the open system the computer system is connected to the internet through the public network. On the other hand the closed systems are never connected to the internet. As per Loren and Mercer, connectivity with the internet converts a closed system to an open system.
Implementation / Methodology:
The methodology of using the digital evidence handling system can be subdivided into several sections like planning, capturing, storing and analysis. The planning stage is about the strategy of how to capture the data. As previously discussed, the digital data may have various forms. In this context, it is necessary to make the plan depending on the types and sources of the data. In this stage, the consideration of the associated legislations is also important. Depending on the data type, the devices that will be used for data capturing are also decided (Preserving And Protecting Computer Evidence).
In the capturing section, proper devices are used for capturing the dat. For example, in case of crime scene investigation, the photographs are taken by using the digital camera. In some cases, some evidences are captured through the audio recorders. In this area, the uses of the modern mobile phones are very popular. In some special cases, some specific forensic toolkits are also used for capturing the digital data (Ashcroft et al. 54).
After capturing the data, it is important to store those data securely in digital format. This work is done by using the security tools of the information technology. Usually, the database management systems are used for the storing and handling of the digital evidences.
In the final stage, the digital evidences are analyzed by using the computerized forensic tools. Some applications of critical thinking depending on the situations are also required for the analysis of the data or digital evidences.
While handling the digital evidences, it is very important to have an efficient user for handling those. The person who may handle the evidences should be well aware about the database system using of the digital evidence handling purpose. Some minor mistake may cause a great damage to the digital evidences. Another major issue is the security. In most of the cases, the forensic evidences are confidential (Digital Evidence: How It’s Done). There are some security issues, especially in the open system because of the internet threats and hackers. The users also need to avoid the unauthorized access to private data as per the legislations of the service area.
The digital technology is one of the most updated technologies across the globe which has changed the dimension of handling the data and information in many sectors. The research work in the area of the evidence collection and protection will help to understand the different types of advance use of the digital technology in the area of the important evidence storing and securing. The research work will contribute some effective information for the organizations that are using the digital technology for this purpose and the future researchers in the academic field.
The results of the research study can be used in the further research studies on future as the empirical data. At the end of the research study, some recommendations will be given in the area of the applications of the research topic. Future research works can be done to investigate the efficiencies of the given recommendations.
"Digital Evidence: A Short Guide - Irecord". iRecord. N. p., 2015. Web. 1 Dec. 2016.
"Digital Evidence: How It’S Done". Forensicsciencesimplified.org. N. p., 2016. Web. 1 Dec. 2016.
"Preserving And Protecting Computer Evidence". Electronicevidenceretrieval.com. N. p., 2016. Web. 1 Dec. 2016.
Al Fahdi, M., Nathan L. Clarke, and Steven M. Furnell. "Challenges to digital forensics: A survey of researchers & practitioners attitudes and opinions." 2013 Information Security for South Africa. IEEE, 2013.
Ashcroft, John, Deborah Daniels, and Sarah Hart. "Forensic Examination Of Digital Evidence: A Guide For Law Enforcement". (2004): n. pag. Print.
Breitinger, Frank, et al. "Towards a process model for hash functions in digital forensics." International Conference on Digital Forensics and Cyber Crime. Springer International Publishing, 2013.
Casey, Eoghan, Andrew Blitz, and Christopher Steuart. "Digital Evidence and Computer Crime." (2014): 224.
Flick, Uwe. Introducing research methodology: A beginner's guide to doing a research project. Sage, 2015.
Gast, David L., and Jennifer R. Ledford. Single case research methodology: Applications in special education and behavioral sciences. Routledge, 2014.
Hosmer, Chet. "Digital Evidence Bag". Communications Of The Acm 49.2 (2006): 69-70. Print.
Loren, D and M.F.S Mercer,. "Computer Forensics Characteristics And Preservation Of Digital Evidence". FBI Law Enforcement Bulletin (2004): n. pag. Print.
Marshall, Angus M. "Digital Forensics Digital Evidence In Criminal Investigation". A John Wiley & Sons, Ltd., Publication (2008): n. pag. Print.
Nance, Kara, Matt Bishop, and Amelia Phillips. "Introduction to Digital Forensics--Education, Research, and Practice Minitrack." System Sciences (HICSS), 2013 46th Hawaii International Conference on. IEEE, 2013.
Roussev, Vassil, Candice Quates, and Robert Martell. "Real-time digital forensics and triage." Digital Investigation 10.2 (2013): 158-167.
Sang, Ting. "A log based approach to make digital forensics easier on cloud computing." Intelligent System Design and Engineering Applications (ISDEA), 2013 Third International Conference on. IEEE, 2013.
Silverman, David, ed. Qualitative research. Sage, 2016.
Simon, Matthew, and Kim-Kwang Raymond Choo. "Digital forensics: challenges and future research directions." Simon M and Choo KK R (2014): 105-146.
Taylor, Robert W., Eric J. Fritsch, and John Liederbach. Digital crime and digital terrorism. Prentice Hall Press, 2014.
Taylor, Steven J., Robert Bogdan, and Marjorie DeVault. Introduction to qualitative research methods: A guidebook and resource. John Wiley & Sons, 2015.