401 Class 34: Forensics Investigation with Autopsy - nataliabdallah/codefellows-ops-reading-notes GitHub Wiki

Home | README.md | Portfolio | |

Reading What is Computer Forensics?

What are the main differences between computer forensics and cybersecurity?

  • Forensics is about investigating, cybersecurity is an all encompassing concept that includes forensics

What are the six stages of a computer forensics examination?

1.Preparation: This initial stage involves setting up for the investigation, including gathering all necessary tools, software, and resources. The forensic analyst also prepares documentation to record all steps taken during the examination. Preparation also involves understanding the case background, obtaining legal authority to proceed (if necessary), and defining the scope of the investigation. 2.Preservation: The preservation stage is critical to ensure that the digital evidence is collected in a way that maintains its integrity. This involves creating a forensic copy (or image) of the storage media to be analyzed, ensuring that the original data remains unaltered. This step often includes securing the scene to prevent any tampering with the evidence. 3.Acquisition: During acquisition, the forensic analyst collects digital evidence from various sources using forensically sound methods. This can include imaging hard drives, capturing memory, and collecting data from other digital devices like smartphones and tablets. The goal is to gather all potentially relevant data while ensuring no data is altered or damaged in the process. 4.Analysis: In the analysis stage, the forensic examiner reviews the collected data to identify relevant evidence that pertains to the case. This involves using various forensic tools and techniques to recover files (including deleted ones), examine file metadata, analyze system logs, and scrutinize user activities. The analyst must also interpret the data in the context of the investigation. 5.Documentation and Reporting: Throughout the examination, the forensic analyst documents every step taken, including how evidence was collected, analyzed, and preserved. The final report compiles these details, presenting the findings in a clear, concise, and non-technical manner for legal proceedings or other stakeholders. This report should include an executive summary, detailed findings, and the analyst's conclusions and recommendations. 6.Presentation: The final stage may involve presenting the findings in court or to other stakeholders, where the forensic analyst might be called upon to explain the technical details of the investigation and the conclusions drawn from the analysis. This requires the analyst to convey complex information in a manner that is understandable to non-technical audiences. six stages of a computer forensics examination