Site icon LIFARS, a SecurityScorecard company

Acquisition of Digital Evidence for Forensic Investigation

Acquisition of Digital Evidence for Forensic Investigation

Acquisition of Digital Evidence for Forensic Investigation

The way of collecting digital forensic evidence is very important. The evidence in this area is volatile and delicate. It should be noted that due to improper handling, the investigation may be disrupted. In other words, acquisition, storage, transmission, and the preservation of evidence require precise procedures.

When securing digital evidence, the following characteristics need to be ensured:

 

Containing a threat or an event is the first step in the mind of cyber professionals, but gathering information and evidence to pursue legal action typically follows immediately afterward. Our Digital Forensics Services specialize in getting to the bottom of every case with deep science and industry experience.

 

Depending on the type of data and the digital device, the method of data acquisition is selected. There are several methods, for example logical disk-to-disk file, disk-to-disk copy, disk-to-image file and also sparse data copy of a file or folder.

The method of obtaining digital evidence also depends on whether the device is switched off or on.

A significant factor in the acquisition of digital evidence is its volatility. Based on their level of fragility, the most volatile are acquired first. These are, for example, registers, cache, routing table, arp cache, process table and memory. It continues with temporary file systems and securing the disk. Last is more static data, such as physical configuration, network topology, and archival media.

It is also necessary to think about the documentation of the seizure and acquisition of digital evidence. Chain of custody documents the entire process and the handling of data and equipment.

A few facts to keep in mind when acquiring data from workstations or servers:

Common mistakes that occur when obtaining digital evidence:

 

 

References

https://blog.eccouncil.org/how-to-handle-data-acquisition-in-digital-forensics/

Exit mobile version