100% (1)
page:
4 pages/≈1100 words
Sources:
3
Style:
APA
Subject:
IT & Computer Science
Type:
Research Paper
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 29.16
Topic:

Provide An Introduction To Digital Forensic Analysis

Research Paper Instructions:

This project will provide an introduction to digital forensic analysis.

Digital forensic analysis is used to review and investigate data collected through digital communications and computer networks. The National Institute for Standards and Technology (NIST) has defined four fundamental phases for forensic analysis: collection, examination, analysis, and reporting.



Methodology

The methodology includes following a systems process. Identify the requirements, purpose, and objectives of the investigation. Use the information below that will aid in conducting and documenting an investigation:

secure programming fundamentals

forensics fundamentals

Consider secure programming fundamentals. Define the digital forensics analysis methodology, and the phases of the digital forensics fundamentals and methodology, including the following:

preparation

1. Extraction

2. Identification

3. Analysis

This information will help you understand the process you will use during an investigation.

In-text citation and time of delivering for this paper are very important. Please, I need the paper 14 June 19. Thank you



Tools and Techniques

Use the following forensic analysis tools, methods, and techniques:

1. Forensics analysis tools

2.Weblog and session analysis

3. Hash analysis

Use the material presented in this project to conducted outside of the course materials to write a research paper that addresses the following:

1. Digital forensic methodology

2. The importance of using forensic tools to collect and analyze evidence (e.g., FTK Imager and EnCase)

3. Hashing in the context of digital forensics

4. How do you ensure that the evidence collected has not been tampered with (i.e., after collection)? Why and how is this important to prove in a court of law?

Research Paper Sample Content Preview:

Digital Forensic Analysis
Name
Course
Date
Abstract
Digital forensic analysis helps in identifying, collecting and analyzing evidence with investigations one of the first steps to establish what is required using obtained evidence. The digital forensics tools allow data replication and evaluating the electronic evidence, and in this way determine if a later analysis with other tools is justified. These tools are required to create perfect copies (forensic images) of computer data without making changes to the original evidence. The forensic images of a hard disk, driver, network, file, and mobile devices are obtained using the analysis methodology where there is preparation, extraction, identification and analysis of evidence. There is a combination of various approaches and techniques to obtain and analyze the evidence such as the forensic analysis tools and device imaging procedures. Forensic evidence was extracted using forensic tools and the electronic content was evaluated identified following collection, examination, analysis, and reporting.
Introduction 
In digital forensic analysis, there are different phases and identifying the incident followed by collecting evidence is the initial steps in the analysis process. It is also necessary to preserve the evidence before the actual analysis takes place and then documentation and presentation of the results (Akbal & Dogan, 2018). It is important essential to document everything that is done and especially the most important actions in each phase. o Investigations
Purpose
Digital forensics is the set of principles and techniques that comprise the process of acquisition, preserving and, documenting digital evidence and that, where appropriate, they can be accepted legally in a judicial process. Increasingly, there are more violations or attempts to violate the security policies and computer systems. Digital forensics analysis then highlights how to identify incidents and collect evidence analyzed and report the results of an investigation
Objective
Digital forensics will help to validate the digital forensic process and is useful to determine how best to monitor and improve network security. Collecting reliable forensic evidence is crucial to undertake the digital forensics process.o Analysis Methodology
Analysis methodology reflects all the tasks performed by the digital forensic tools, and these tools perform specific tasks including preparation, extraction, identification and analysis. Acquiring, preserving and retrieving evidence is crucial in studying the digital forensics analysis and the methodology is necessary to test the digital forensics. The forensic tools and tests to get valid results and acquiring the required tools is crucial to undertake digital forensics. Preparation 
Preparation is the plan of action that involves using the right tools and techniques is necessary as evidence gathering systems are prepared, before extracting data from the devices and the log files.
Extraction
Extraction involves recovering evidence and there is data extraction from connected devices, there is also focus on ensuing that the evidence is relevant since this affects analysis. Extraction is a challenging task and forensic investigators focus on different functions to achieve this including: packet viewing, keyword searching, decompressing, decrypting, carving and bookmarking
Identification
There is determination of the strength of evidentiary “relevance” of the data and the information or images are copied before there is analysis.Analysis
When carrying out the analysis of the information collected, it is necessary to the necessary information on an incident. In this way, when setting the evidence there is more in-depth analysis and no information is discarded. Furthermore, the data collected related to different items of evidence is noted. Analysis helps to draw conclusions depending on the evidence and collecting different types of evidence is necessary to analyze the evidence thoroughly (Reed, Scanlon & Le-Khac, 2017)
o Analysis ToolsForensic Analysis Tools
These tools are required when performing forensic operations, and those with different functionalities and robust are preferred as they are more effective in investigations. Some of the tools are open source, and regardless of choice of analysis tools the ability to find information , analyze timelines, keyword searches, filleted information, images and various digital evidence files is prioritized. The tools have different capabilities and Bulk Extractor decrypts email addresses and URLs and other tools have diverse capabilities. Web Log and Session Analysis
Getting useful information from Web logs and sessions is necessary to analyze the web logs, persistent or session cookies. Log and session analysis is useful to collect information about the accessibility web servers and websites as well as analysis of events and the...
Updated on
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

👀 Other Visitors are Viewing These APA Essay Samples:

Sign In
Not register? Register Now!