Sunday, September 22, 2019

The process of gathering forensic evidence Essay

The process of gathering forensic evidence - Essay Example Electronic data is also fragile like any other type of data so any data that is to be preserved has to undergo a given protocol to make it safe. The expert should ensure that the data is not damaged and that computer virus does not affect the data. This can be done by storing data in a computer that is well protected from any virus and at the same time has a secure system that gives access to only stakeholders who can come up with the password. Once its location has been known the data has to be collected by the experts. They have to go to the virtually stored data get it and record it in the prepared storage device that had been preserved for its storage and that has minimum potential of destroying the data. When collecting the data various data collection tools are required to enable the process. This is the part where the experts sit down and examine the data that had been collected. This is the stage where they are able to know if the data has been tampered with after they have done all this then they have to give the go ahead for the writing of the report. This is a computer hardware toolkit that is used in the performance of very detailed digital examination of forensic evidence. It is built using ubuntu software and is able to combine witness experience to come up with a witness format that is used in hand with advanced forensic format. The software’s that are used to make the device is sleuth kit which is a kit used to make file systems for analysis. The device has the capability of taking fingerprints through a touch screen and storing it in the computer memory. This tool helps forensic experts to secure and examine raw data disks. It also has the capability of handling multiple file systems as well as come up with the format for the evidence that has been made. The tool also has the capability of placing strict deadlines to the data and how to work on it. In order to see all visible traffics, the tool is able to

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.