The ABC of Cybersecurity: How to prevent Phishing & Social Engineering Attacks, Incident Management Best Practices and Cybersecurity Awareness for Employees by Miller Mike & Miller Mike
Author:Miller, Mike & Miller, Mike [Miller, Mike]
Language: eng
Format: epub
Published: 2020-11-04T00:00:00+00:00
Chapter 35 How to Collect Evidence
Yet another critical aspect of the investigator's job is evidence collection and control. We cannot emphasize how significant this is to the investigation. Evidence collection is essentially, from our computer forensics point of view, the preservation, the acquisition, discovery, analysis, and documentation of the evidence, and sometimes that also includes the presentation of the evidence as well. Essentially, you're collecting the evidence, you're taking care of it, and youâre making sure that nothing happens to it, that it doesn't change at all, especially in a digital environment. Evidence control is probably one of the most important parts of the investigation. This is because this has to be done right the first time. If you don't control evidence or if it gets tainted in any way, then your case is done essentially. Keep in mind that digital evidence can be changed very easily. If one single bit in a hard drive flips from a 0 to a 1, that's changing the evidence. More often, we're concerned with changing the timestamps of evidence or the addition or deletion of files. We have to obtain evidence, especially digital evidence in a legally and forensically sound manner using tried and true techniques that can be reproduced and examined in a court of law. Because we may be investigating this as a crime, evidence has to be also handled in accordance with the law and from a legal perspective. It's different than just taking an image of a hard drive and taking it to the office and looking at it to see if someone's been surfing the net for unacceptable things in a company. You, as the investigator, have to ensure that the evidence has been acquired forensically and is controlled at all times. It also must be documented at every step of the way. One of the things that an investigator learns first is how to treat the crime scene. It should be handled with care. It should be cordoned off from people who don't need to be there, and nothing should be disturbed except as part of the investigation. Chain of custody is very important during this part of the investigation. It will make or break your case. If you have taken a hard drive from a suspect's computer and simply handed it off to someone, then how do you know that they didn't change it later, or how do you know that they didn't substitute the drive for another one? How do you know that they just didn't be careless and put it in their bag and it gets lost? With chain of custody, you can prevent all of those things. Here are some things to think about with chain of custody. First of all, document everything. When you take something from a crime scene, a hard drive, or an SD card, or even a whole computer, you should document it. You should record its serial number, its model number, its make, the time of day that you took it, the location you took it.
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7662)
Grails in Action by Glen Smith Peter Ledbrook(7576)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(5980)
Azure Containers Explained by Wesley Haakman & Richard Hooper(5949)
Running Windows Containers on AWS by Marcio Morales(5456)
Kotlin in Action by Dmitry Jemerov(4926)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(4578)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4329)
Combating Crime on the Dark Web by Nearchos Nearchou(4149)
The Age of Surveillance Capitalism by Shoshana Zuboff(3818)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(3806)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(3725)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3416)
Python for Security and Networking - Third Edition by José Manuel Ortega(3373)
Mastering Python for Networking and Security by José Manuel Ortega(3240)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3232)
Blockchain Basics by Daniel Drescher(3196)
The Ultimate Docker Container Book by Schenker Gabriel N.;(3051)
TCP IP by Todd Lammle(2888)
