Digital Forensic Investigation

3093 Words13 Pages
Digital Forensic Investigation Student’s name Institution Abstract Sources of data used as evidence in digital forensic inquiry vary significantly depending on the type of a case being investigated. This paper focuses on sources of data used to acquire evidence for malware installations, insider file deletion, and network intrusions. These 3 cases lead to prioritization of the sources of data that are analyzed, the information that is looked for, and the importance of the acquired data concerning the event. The primary sources in computer forensic include live data systems, audits, records from the Internet service provider, hard drives, virtual machines, network drives, intrusion detection systems and accounts audit. Digital Forensic Investigation Introduction Digital forensic involves investigations that deal with various types of data in order to preserve and capture activities that are committed illegally to be used as evidence. The investigators usually determine the source of data depending on the event they are investigating. The objective of this paper is to discuss various sources of data in digital forensic, prioritizing the discussion on malware installation, insider file deletion, and network intrusion and prioritizing each source of data according to the importance in investigating the three cases. Network Intrusion A network intrusion takes place when the network of a computer is accessed by a party that is unauthorized. This kind of intrusion can cause severe damage to an organization because files can be stolen, deleted or altered, and software or hardware destroyed. In the case study by Casey (2005), which was published in the Journal of Digital Investigation, investigation on network intrusion was well described. In March 2000, a system administrator in a medical research facility while carrying out the routine maintenance tasks

More about Digital Forensic Investigation

Open Document