Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
8 views22 pages

IDF Unit-5

The document discusses the challenges faced in digital forensics, including rapid technological advancements, data volume, encryption, legal issues, and resource constraints. It also highlights the significance of intellectual property rights in the context of computer crime, detailing types of IP theft and legal enforcement mechanisms. Additionally, privacy concerns in digital forensics are examined, emphasizing the need for balancing investigative requirements with individual privacy rights.

Uploaded by

Krishna Prasad K
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views22 pages

IDF Unit-5

The document discusses the challenges faced in digital forensics, including rapid technological advancements, data volume, encryption, legal issues, and resource constraints. It also highlights the significance of intellectual property rights in the context of computer crime, detailing types of IP theft and legal enforcement mechanisms. Additionally, privacy concerns in digital forensics are examined, emphasizing the need for balancing investigative requirements with individual privacy rights.

Uploaded by

Krishna Prasad K
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 22

Srinivas University B. Tech.

(CSCF)-IV Semester

Module-5

5.1 Challenges in Digital Forensics


Digital forensics, the process of investigating and analyzing digital devices and electronic
evidence, presents several challenges that investigators must overcome to ensure accurate and
reliable results. Here are some key challenges in digital forensics:
Rapid Technological Advancements: The fast-paced evolution of technology poses a significant
challenge for digital forensics. New devices, operating systems, applications, and encryption
methods constantly emerge, requiring investigators to stay updated and adapt their techniques and
tools accordingly.
Volume and Variety of Data: The sheer volume of digital data has exponentially increased in recent
years, making it challenging to identify relevant evidence efficiently. Different data types, such as
text messages, emails, images, videos, and social media posts, further complicate the analysis
process.
Data Hiding and Encryption: Perpetrators often employ advanced techniques to hide or encrypt
data, making it difficult to detect and retro//ieve. Encryption algorithms, steganography, and anti-
forensic tools pose significant challenges in accessing and deciphering protected or hidden data.
Anti-Forensic Techniques: Attackers actively employ anti-forensic techniques to impede
investigations. These techniques include file wiping, data obfuscation, file fragmentation, and
tampering with timestamps, making it harder to recover and analyze digital evidence.
Cloud and Remote Storage: The widespread adoption of cloud computing and remote storage
services presents challenges in accessing and preserving digital evidence stored offsite.
Investigators must navigate legal and technical obstacles to obtain data from service providers and
maintain the integrity of evidence during collection and analysis.
Legal and Privacy Concerns: Digital forensics operates within a legal framework, requiring
investigators to adhere to privacy laws and regulations. Balancing the need for evidence with
individual privacy rights presents ongoing challenges in obtaining lawful access to digital devices
and data.
Lack of Standardization: Digital forensics lacks a universal set of standards and protocols, leading
to inconsistencies in methodologies, tools, and reporting across jurisdictions. This lack of
standardization poses challenges in collaboration, quality assurance, and ensuring the admissibility
of evidence in court.
Time and Resource Constraints: Digital forensic investigations can be time-consuming and
resource-intensive. Analyzing large volumes of data, recovering deleted or damaged files, and
conducting thorough examinations require significant manpower, specialized expertise, and
advanced forensic tools.
Volatility and Fragility of Digital Evidence: Digital evidence is often volatile and susceptible to
alteration or destruction. Devices can be easily modified or compromised remotely, necessitating
swift and accurate acquisition and preservation techniques to maintain the integrity and
authenticity of evidence.
International Jurisdictional Challenges: With digital crimes spanning international boundaries,
investigators may face jurisdictional challenges when attempting to access evidence stored abroad
or collaborate with foreign law enforcement agencies.
Addressing these challenges requires ongoing research, collaboration among digital forensics
professionals, and the development of innovative techniques, tools, and training programs to
ensure the effectiveness and reliability of digital forensic investigations.

Introduction to Digital Forensics Page 1


Srinivas University B. Tech. (CSCF)-IV Semester

Digital forensics has been defined as the use of scientifically derived and proven methods towards
the identification, collection, preservation, validation, analysis, interpretation, and presentation of
digital evidence derivative from digital sources to facilitate the reconstruction of events found to
be criminal. But these digital forensics investigation methods face some major challenges at the
time of practical implementation. Digital forensic challenges are categorized into three major
heads as shown below
➢ Technical challenges
➢ Legal challenges
➢ Resource Challenges

Technical Challenges: As technology develops crimes and criminals are also developed with it.
Digital forensic experts use forensic tools for collecting shreds of evidence against criminals and
criminals use such tools for hiding, altering or removing the traces of their crime, in digital forensic
this process is called Anti- forensics technique which is considered as a major challenge in digital
forensics world. Anti-forensics techniques are categorized into the following types: -

S. No. Type Description


It is legitimately used for ensuring the privacy of
information by keeping it hidden from an
1 Encryption unauthorized user/person. Unfortunately, it can
also be used by criminals to hide their crimes.
Criminals usually hide chunks of data inside the
Data hiding in storage space storage medium in invisible form by using
2
system commands, and programs.
A covert channel is a communication protocol
which allows an attacker to bypass intrusion
detection technique and hide data over the
3 Covert Channel network. The attacker used it for hiding the
connection between him and the compromised
system.
Other Technical challenges are:
• Operating in the cloud
• Time to archive data
• Skill gap
• Steganography

Legal challenges
The presentation of digital evidence is more difficult than its collection because there are many
instances where the legal framework acquires a soft approach and does not recognize every aspect
of cyber forensics, as in Jagdeo Singh V. The State and Ors case Hon’ble High Court of Delhi held
that “while dealing with the admissibility of an intercepted telephone call in a CD and CDR which
was without a certificate under Sec. 65B of the Indian Evidence Act, 1872 the court observed that
the secondary electronic evidence without certificate u/s. 65B of Indian Evidence Act, 1872 is not
admissible and cannot be looked into by the court for any purpose whatsoever.” This happens in

Introduction to Digital Forensics Page 2


Srinivas University B. Tech. (CSCF)-IV Semester

most of the cases as the cyber police lack the necessary qualification and ability to identify a
possible source of evidence and prove it. Besides, most of the time electronic evidence is
challenged in the court due to its integrity. In the absence of proper guidelines and the nonexistence
of proper explanation of the collection, and acquisition of electronic evidence gets dismissed in
itself.
S. no Type Description
In India, there are no proper guidelines for the
collection and acquisition of digital evidence. The
investigating agencies and forensic laboratories
Absence of guidelines and
1 are working on the guidelines of their own. Due to
standards
this, the potential of digital evidence has been
destroyed.
The Indian Evidence Act, 1872 have limited
approach, it is not able to evolve with the time and
address the E-evidence are more susceptible to
tampering, alteration, transposition, etc. the Act is
silent on the method of collection of e-evidence it
Limitation of the Indian
2 only focuses on the presentation of electronic
Evidence Act, 1872
evidence in the court by accompanying a
certificate as per subsection 4 of Sec. 65B. This
means no matter what procedure is followed it
must be proved with the help of a certificate.
Other Legal Challenges
• Privacy Issues
• Admissibility in Courts
• Preservation of electronic evidence
• Power for gathering digital evidence
• Analyzing a running computer

Resource Challenges
As the rate of crime increases the number of data increases and the burden to analyze such huge
data is also increases on a digital forensic expert because digital evidence is more sensitive as
compared to physical evidence it can easily disappear. For making the investigation process fast
and useful forensic experts use various tools to check the authenticity of the data but dealing with
these tools is also a challenge in itself.
Types of Resource Challenges are:-
Change in technology
Due to rapid change in technology like operating systems, application software and hardware,
reading of digital evidence becoming more difficult because new version software’s are not
supported to an older version and the software developing companies did provide any backward
compatible’s which also affects legally.
Volume and replication
The confidentiality, availability, and integrity of electronic documents are easily get
manipulated. The combination of wide-area networks and the internet form a big network that

Introduction to Digital Forensics Page 3


Srinivas University B. Tech. (CSCF)-IV Semester

allows flowing data beyond the physical boundaries. Such easiness of communication and
availability of electronic document increases the volume of data which also create difficulty in the
identification of original and relevant data.

5.2 Computer Crime and Legal Issues: Intellectual Property


I. Introduction to Computer Crime:
Computer crime refers to illegal activities that involve the use of computers or computer networks.
It encompasses a wide range of offenses, including hacking, identity theft, fraud, cyberstalking,
and intellectual property theft.
II. Intellectual Property (IP) and its Importance:
A. Definition:
Intellectual Property refers to legal rights that protect creations of the human mind, such as
inventions, artistic works, trademarks, and trade secrets.
It provides creators and innovators with exclusive rights to their creations, encouraging innovation
and creativity.
B. Types of Intellectual Property:
Copyright: Protects original works of authorship, such as literature, music, software, and visual
arts.
Patents: Protects inventions and discoveries, granting exclusive rights to inventors for a limited
period.
Trademarks: Protects brand names, logos, and symbols that distinguish products or services.
Trade Secrets: Protects valuable and confidential business information, such as formulas,
processes, and customer lists.
III. Intellectual Property Theft in Computer Crime:
A. Unauthorized Copying and Distribution:
Unauthorized copying and distribution of copyrighted materials, such as movies, music, software,
and books.
This includes piracy, file-sharing, and the distribution of counterfeit goods.
B. Software Piracy:
Illegal copying, distribution, or use of software without the proper licenses or authorization.
This includes the use of unauthorized software copies or keygens to bypass licensing restrictions.
C. Counterfeit Products:
Production, distribution, or sale of counterfeit goods, including counterfeit luxury items,
electronics, and pharmaceuticals.
D. Trade Secret Theft:
Unauthorized access, acquisition, or use of trade secrets, such as proprietary information, business
plans, or manufacturing processes.
IV. Legal Issues and Enforcement of Intellectual Property Rights:
A. International Laws and Treaties:
Countries have enacted laws and participated in international treaties to protect intellectual
property rights, such as the World Intellectual Property Organization (WIPO) and the Agreement
on Trade-Related Aspects of Intellectual Property Rights (TRIPS).
B. Legal Remedies and Penalties:
Civil Lawsuits: IP owners can file civil lawsuits to seek damages and injunctions against infringers.
Criminal Prosecution: Serious IP violations can lead to criminal charges, resulting in fines and
imprisonment.

Introduction to Digital Forensics Page 4


Srinivas University B. Tech. (CSCF)-IV Semester

C. Digital Millennium Copyright Act (DMCA):


U.S. legislation that provides legal protection for copyright owners in the digital realm.
It criminalizes the circumvention of digital rights management (DRM) systems and provides safe
harbors for online service providers.
D. Digital Forensics and IP Theft Investigations:
Digital forensics plays a crucial role in investigating and gathering evidence of intellectual
property theft.
Forensic techniques can be used to recover deleted files, analyze network traffic, trace digital
footprints, and identify the source of the theft.
V. Best Practices for Intellectual Property Protection:
A. Intellectual Property Audits:
Conduct regular audits to identify and protect valuable intellectual property assets within an
organization.
B. Employee Education and Policies:
Educate employees about intellectual property laws, their obligations, and the consequences of
infringement.
Implement clear policies and procedures regarding the use and protection of intellectual property.
C. Use of Technological Safeguards:
Implement technical measures, such as encryption, digital rights management (DRM), and
watermarking, to protect digital intellectual property.
D. Collaboration and Information Sharing:
Collaborate with industry associations, organizations, and law enforcement agencies to share
information and combat intellectual property theft collectively.
VI. Conclusion:
Intellectual property theft in computer crime poses significant challenges and impacts creators,
innovators, and industries worldwide.
Understanding the legal issues surrounding intellectual property and implementing robust
protection measures are essential to safeguarding intellectual property rights and fostering
innovation.

Intellectual property encompasses the rights involving the original expression of work and
inventions in a tangible form that has the capacity to be duplicated multiple times. The protection
of such property against unfair competition is essential to the rights of the human endeavour in its
intellectually innovative form. Resources and skills are invested in intellectual property, where the
creator stimulates research and development to achieve economic development and technological
advancements for the country and society at large. Intellectual property rights engrossed itself as
a strong tool to keep intellectual endeavours intangible medium.

With the onset of cyber technology, global markets have benefited copyright owners. This is true,
but beyond the considered benefits, the risks loom large, if the consequences of emerging trends
are left unaddressed. Like any desired invention, cyber technology has its pitfalls. Unlicensed use
of trademarks, trade names, service marks, images, codes, audios, videos, literature content by way
of illegitimate practices of hyperlinking, framing, meta-tagging, spamming, and the list is endless,
emerge as the regular infringements to the new universe of intellect and skills in the cyber domain.

Introduction to Digital Forensics Page 5


Srinivas University B. Tech. (CSCF)-IV Semester

The Computer Crime and Intellectual Property Section pursues three overarching goals: to deter
and disrupt computer and intellectual property crime by bringing and supporting key investigations
and prosecutions, to guide the proper collection of electronic evidence by investigators and
prosecutors, and to provide technical and legal advice and assistance to agents and prosecutors in
the U.S. and around the world.

CCIPS executes this mission in a wide variety of ways, including (a) by identifying, supporting,
and prosecuting high-impact, cutting-edge, and sensitive investigations and prosecutions; (b) by
providing expert legal and technical advice, training, and support to the Department, investigative
agencies, and other executive branch agencies; (c) promoting international policy that favors
enforcement of computer crime and IP laws abroad, especially through building the capacity of
foreign governments to investigate and prosecute; (d) by providing to prosecutors elite-level digital
investigative analysis; (e) by advising on and litigating in support of the lawful collection of
electronic evidence; and (f) by developing and advocating for computer and intellectual property
crime policies and legislation.

5.3 Privacy Issues in Digital Forensics


Privacy issues in digital forensics are a significant concern due to the increasing reliance on digital
technologies and the collection of vast amounts of personal data. The privacy issues in Digital
forensics are;

Data Collection: Digital forensics involves the collection and analysis of electronic evidence. This
process often requires accessing personal data stored on devices such as computers, smartphones,
or online platforms. Privacy concerns arise when data is collected beyond what is necessary for
the investigation, or when data unrelated to the investigation is accessed without proper
authorization.

Scope of Investigation: Privacy issues can arise when the scope of a digital forensic investigation
is overly broad, leading to the collection and analysis of data unrelated to the specific case. This
can result in the invasion of privacy and the exposure of personal information that is not relevant
to the investigation.

Data Retention and Storage: Digital forensic investigators need to handle the collected data
appropriately, ensuring secure storage and appropriate retention periods. Failure to properly handle
and protect this data can lead to breaches of privacy and potential misuse or unauthorized access.

Consent and Legal Requirements: In some cases, digital forensics may involve accessing private
information without the explicit consent of the individuals involved. Balancing the need for
investigation with individual privacy rights is a complex challenge. Investigators must comply
with relevant laws, regulations, and legal procedures to ensure the protection of privacy rights.

Secondary Use of Data: Privacy concerns can arise when data collected during a digital forensic
investigation is used for purposes other than the original investigation without proper consent or
authorization. This includes sharing the data with third parties or using it for unrelated
investigations.

Introduction to Digital Forensics Page 6


Srinivas University B. Tech. (CSCF)-IV Semester

Anonymization and De-identification: It is crucial to ensure that any personally identifiable


information (PII) obtained during digital forensic analysis is appropriately anonymized or de-
identified to protect the privacy of individuals involved in the investigation. Failing to do so can
lead to the identification of individuals who are not directly related to the case.

International and Cross-Border Data Transfers: Digital forensics often involves cross-border data
transfers, which can pose privacy challenges due to varying data protection laws and regulations
in different jurisdictions. The transfer and processing of personal data across borders must comply
with applicable legal frameworks to safeguard privacy.

Encryption and Privacy: The use of encryption technologies to protect sensitive data presents
challenges for digital forensic investigations. While privacy advocates argue for strong encryption
to protect individual privacy, law enforcement agencies may seek to access encrypted data for
investigative purposes. Striking a balance between encryption and lawful access is an ongoing
debate in the realm of digital forensics.

Addressing these privacy issues requires a careful balance between the investigative needs of
digital forensics and the protection of individual privacy rights. Legal frameworks, ethical
guidelines, and technological safeguards are crucial in ensuring that digital forensic investigations
are conducted in a manner that respects privacy and preserves the rights of individuals involved.

Protecting digital data privacy in computer forensic examinations involves several key measures.
Here are some steps that can be taken to safeguard data privacy during forensic investigations:

Legal and Ethical Considerations: Adhere to legal and ethical guidelines throughout the
investigation process. Ensure compliance with relevant laws, such as data protection and privacy
regulations, as well as industry-specific regulations.

Consent and Warrants: Obtain appropriate legal consent or warrants before conducting any
forensic examination. Ensure that the investigation is authorized and conducted within the
boundaries defined by law.

Minimize Data Collection: Collect only the necessary data relevant to the investigation. Avoid
indiscriminate or unnecessary data collection to minimize the exposure of sensitive information.

Data Segregation: Segregate and separate data based on relevance and sensitivity. Distinguish
between data that is directly related to the investigation and data that is extraneous or unrelated.

Data Encryption: Utilize encryption techniques to protect sensitive data during storage,
transmission, and analysis. Encryption helps prevent unauthorized access to the information being
examined.

Access Controls: Implement strict access controls to limit the number of individuals who can
access the digital evidence. Use strong authentication mechanisms, such as passwords, biometrics,
or multi-factor authentication, to ensure that only authorized personnel can access the data.

Introduction to Digital Forensics Page 7


Srinivas University B. Tech. (CSCF)-IV Semester

Secure Storage: Store the digital evidence in secure and controlled environments. Physical security
measures, such as locked cabinets or safes, and logical security measures, such as encryption and
access controls, should be in place to safeguard the stored data.

Data Integrity: Maintain the integrity of the original evidence throughout the forensic examination
process. Employ measures like write-blocking tools or hardware write-blockers to prevent
unintentional modification or tampering of the evidence.

Data Retention and Destruction: Establish clear policies for data retention and destruction. Ensure
that data that is no longer required for the investigation is securely and permanently deleted to
prevent unauthorized access or leakage.

Documentation and Audit Trails: Maintain detailed documentation and audit trails of all actions
performed during the forensic examination. This helps ensure accountability and traceability while
minimizing the risk of privacy breaches.

Privacy Impact Assessments: Conduct privacy impact assessments to evaluate the potential risks
and impacts on data privacy during the forensic investigation. This assessment helps identify
privacy vulnerabilities and implement appropriate mitigations.

Training and Awareness: Provide ongoing training and awareness programs for forensic examiners
and other personnel involved in the investigation. Educate them on privacy best practices, legal
obligations, and emerging privacy concerns to foster a privacy-conscious culture.

It is crucial to consult with legal experts and professionals experienced in computer forensics to
ensure compliance with the specific legal and privacy requirements of your jurisdiction.

5.4 Criminal Justice system for forensic


The criminal justice system encompasses various processes and institutions that aim to maintain
law and order, investigate crimes, and ensure justice is served. One critical aspect of the criminal
justice system is forensic science, which involves the application of scientific methods and
techniques to investigate and analyze evidence related to criminal cases. Digital forensics, a
specialized branch of forensic science, focuses specifically on the collection, preservation, and
analysis of digital evidence.

Digital forensics involves the examination of electronic devices, such as computers, smartphones,
tablets, and network systems, to uncover evidence that may be crucial in criminal investigations.
This field has become increasingly important in the modern era due to the widespread use of digital
technology and the interconnected nature of our lives.

The process of digital forensics within the criminal justice system generally follows these key
steps:

Identification and seizure of digital evidence: Law enforcement agencies or specialized forensic
teams identify and secure digital devices that may contain relevant evidence. This requires proper

Introduction to Digital Forensics Page 8


Srinivas University B. Tech. (CSCF)-IV Semester

documentation, chain of custody protocols, and the use of specialized tools and techniques to
prevent data alteration or loss.

Preservation and analysis of digital evidence: Once the devices are collected, forensic experts use
specialized software and techniques to create forensic images or exact copies of the digital media.
These images are then carefully analyzed to extract relevant data, such as files, emails, chat logs,
internet browsing history, and metadata.

Data recovery and examination: Forensic analysts employ various methods to recover hidden or
deleted information, including the use of sophisticated software tools and manual investigation
techniques. They examine the data for any signs of tampering, encryption, or malware presence,
aiming to uncover crucial evidence related to the crime under investigation.

Interpretation and reporting: The findings and evidence collected during the digital forensic
analysis are interpreted and presented in a clear and concise manner. Forensic experts generate
detailed reports that outline their methodologies, findings, and conclusions, which may be used in
court proceedings.

Expert testimony and court presentation: Digital forensic experts may be called upon to provide
expert testimony in court. They explain their findings, methodologies, and the significance of the
digital evidence to help the judge and jury understand its relevance to the case.

It's important to note that digital forensics must adhere to strict legal and ethical guidelines to
ensure the integrity of the evidence and protect the rights of individuals involved. The forensic
experts must have expertise in both digital technology and forensic methodologies to effectively
investigate and analyze digital evidence.

Digital forensics has proven invaluable in a wide range of criminal cases, including cybercrime,
financial fraud, intellectual property theft, terrorism, and even cases involving violent crimes. Its
role within the criminal justice system continues to evolve as technology advances, presenting new
challenges and opportunities for investigators and forensic experts to uncover the truth and ensure
justice is served.

Today forensic Science makes a major contribution to the operation of the Criminal Justice System
providing evidence. This could help to decide the guilt of a suspect. Forensic Science has
developed to operate within the reality determined by the Criminal Justice System. Changes are
occurring today. It seems to upset the relationship between Forensic Sciences and the Criminal
Justice System. Examples- the changes occurring in the concept of death made necessary by organ
transplants. The need for reforms in the law because of social changes has been recognized in
many countries. With these changes, a new reality is occurring. Forensic Science comes first in
contact with a multitude of emergent problems and has a part to play in the definition of this reality.
Forensic science has a broad range of applications. It is used in murder cases, and civil cases such
as forgeries, fraud, negligence, etc. It can help law enforcement officials determine whether any
laws or regulations have been violated or not. FS check if any violated rules occur in the marketing
of foods and drinks, the manufacture of medicine, or the use of pesticides on crops. The application
of forensic science can determine whether automobile emissions are within a permissible level and

Introduction to Digital Forensics Page 9


Srinivas University B. Tech. (CSCF)-IV Semester

whether drinking water meets legal purity requirements. Forensic science is used in monitoring
the compliance of different countries. It helps to monitor international agreements such as the
Nuclear Non-Proliferation Treaty and the Chemical Weapons Convention and to learn whether
countries are developing secret nuclear weapons programs. Forensic science commonly is used to
investigate criminal cases involving a victim. Examples- assault, robbery, kidnapping, rape,
murder, etc. The oldest technique of forensic science is dusting the scene of a crime for
fingerprints. Because no two fingerprints are the same. Fingerprinting provides a positive means
of identification. Scientific officers by applying forensic knowledge can able to find the criminal
behind the murder.

5.5 Audit/Investigative Situations and digital crime scene


A forensic audit examines and evaluates a firm's or individual's financial records to derive evidence
used in a court of law or legal proceeding.
Forensic auditing is a specialization within accounting, and most large accounting firms have a
forensic auditing department. Forensic audits require accounting and auditing procedures and
expert knowledge about the legal framework of such an audit.

Forensic audits cover a wide range of investigative activities. A forensic audit is often conducted
to prosecute a party for fraud, embezzlement, or other financial crimes. In the process of a forensic
audit, the auditor may be called to serve as an expert witness during trial proceedings. Forensic
audits could also involve situations that do not include financial fraud, such as disputes related to
bankruptcy filings, business closures, and divorces.
In today's digital age, crimes are not limited to physical spaces; they have expanded into the digital
realm. As a result, digital forensics has become an essential field in investigating and analyzing
evidence related to digital crimes. Digital forensics refers to the collection, preservation, analysis,
and presentation of digital evidence in legal proceedings.

Audit and investigative situations often require the application of digital forensics techniques to
uncover and analyze electronic evidence. These situations can range from corporate fraud
investigations to cybercrime cases. Digital forensics is crucial in such scenarios as it helps in
identifying, preserving, and analyzing digital artifacts that are integral to the investigation process.
During an audit or investigation, digital forensics is employed to establish the facts, identify
potential culprits, determine the extent of the crime, and gather evidence for legal proceedings.
Here are some key aspects to consider:

Digital Crime Scene: When a digital crime occurs, the affected system or device becomes a digital
crime scene. This can include computers, smartphones, servers, or any other digital storage media.
Digital forensics experts carefully analyze the crime scene to identify and preserve evidence that
may be crucial to the investigation.

Evidence Collection: Digital forensics involves the systematic collection of evidence from various
sources such as hard drives, email servers, cloud storage, network logs, and social media platforms.
Specialized tools and techniques are used to ensure the preservation and integrity of the evidence
throughout the collection process.

Introduction to Digital Forensics Page 10


Srinivas University B. Tech. (CSCF)-IV Semester

Data Recovery and Analysis: Once the evidence is collected, it is essential to recover and analyze
the data. Digital forensics experts employ techniques like data carving, password cracking, and
data decryption to retrieve hidden or deleted information. Advanced analysis tools are used to
examine the data, identify patterns, establish timelines, and reconstruct events.

Chain of Custody: Maintaining a strict chain of custody is critical in digital forensics. It ensures
that the integrity and authenticity of the evidence are preserved, making it admissible in court.
Proper documentation and tracking of evidence from the time of collection to its presentation in
court are essential.

Network Forensics: In cases involving cybercrimes or network breaches, network forensics plays
a crucial role. It involves the examination of network traffic, logs, intrusion detection systems, and
other network-related data to identify the origin of an attack, track the actions of the perpetrator,
and analyze the impact on the targeted systems.

Reporting and Presentation: Digital forensics experts are responsible for producing detailed reports
of their findings. These reports outline the methodologies used, the evidence collected, the analysis
performed, and the conclusions drawn. The findings may be presented in court or shared with
relevant stakeholders, such as law enforcement agencies, legal teams, or corporate management.

It is important to note that digital forensics operates within legal frameworks and follows specific
procedures to ensure the admissibility of evidence in court. The field is continuously evolving due
to the rapid advancement of technology, requiring digital forensics professionals to stay updated
with the latest tools, techniques, and legal requirements.

In summary, digital forensics plays a crucial role in audit and investigative situations involving
digital crimes. By leveraging specialized techniques and tools, digital forensics experts collect,
preserve, analyze, and present digital evidence, helping to uncover the truth, identify perpetrators,
and support legal proceedings in a digital context.
➢ A forensic audit is an examination and evaluation of a firm's or individual's financial
records.
➢ During a forensic audit, an auditor seeks to derive evidence that could potentially be used
in court.
➢ A forensic audit is used to uncover criminal behavior such as fraud or embezzlement.
➢ When you are a forensic auditor, you specialize in a particular brand of accounting.
Smaller firms may not have a forensic auditor on the payroll, but most large, commercial
accounting firms have forensic auditing departments.
The process of a forensic audit is similar to a regular financial audit—planning, collecting
evidence, writing a report—with the additional step of a potential court appearance. The attorneys
for both sides offer evidence that either uncovers or disproves the fraud and determines the
damages suffered. They present their findings to the client, and the court should the case go to
trial.

Introduction to Digital Forensics Page 11


Srinivas University B. Tech. (CSCF)-IV Semester

5.6 Investigative Procedure/Standards for Extraction, Preservation, and Deposition of Legal


Evidence in a court of Law
The investigative procedure for the extraction, preservation, and deposition of legal evidence in a
court of law involves a series of steps designed to ensure the integrity and admissibility of the
evidence. The specific procedures may vary depending on the jurisdiction and the nature of the
case, but the general principles remain consistent. Here's an overview of the investigative
procedure and standards for handling evidence:

Identification of Evidence: The first step in the investigative process is to identify and recognize
potential evidence. Investigators must have the knowledge and expertise to identify various types
of evidence, including physical objects, documents, electronic data, witness statements, and expert
opinions.

Securing the Crime Scene: In criminal cases, the crime scene must be secured and protected to
prevent contamination or tampering with evidence. Law enforcement personnel will establish a
perimeter, restrict access, and document the condition of the scene before collecting any evidence.

Collection of Physical Evidence: Physical evidence refers to tangible items that may be relevant
to the case. This can include weapons, fingerprints, DNA samples, clothing, and other objects.
Investigators must use proper techniques, such as wearing gloves or using specialized tools, to
collect, package, and label physical evidence to maintain its integrity.

Documentation and Chain of Custody: Each piece of evidence must be properly documented to
establish a chain of custody, which is a record of the individuals who have had control over the
evidence from the time it was collected until its presentation in court. This documentation includes
details such as the date, time, location, description of the evidence, and the names of the individuals
involved in handling it.

Preservation and Storage: Proper preservation and storage of evidence are crucial to maintaining
its integrity. Different types of evidence require specific conditions to prevent deterioration or
contamination. For example, biological evidence like blood or DNA samples may require
refrigeration, while digital evidence may need to be stored on secure servers to prevent tampering
or loss.

Analysis and Examination: Once evidence is collected, it may undergo analysis and examination
by forensic experts, such as fingerprint analysts, DNA specialists, or digital forensic examiners.
These experts use scientific methods and techniques to analyze the evidence and provide
interpretations or conclusions based on their findings.

Admissibility and Legal Standards: Before evidence can be presented in court, it must meet certain
legal standards to be deemed admissible. The rules of evidence vary by jurisdiction but generally
include criteria such as relevance, authenticity, reliability, and the absence of any legal privilege
or exclusionary rule that would prevent its use in court.

Deposition and Presentation in Court: When the evidence is deemed admissible, it can be presented
in court during the trial or other legal proceedings. The party introducing the evidence typically

Introduction to Digital Forensics Page 12


Srinivas University B. Tech. (CSCF)-IV Semester

calls a witness, such as an investigator or forensic expert, to testify about the evidence's collection,
preservation, analysis, and the conclusions drawn from it.

Cross-Examination and Challenges: During the presentation of evidence, opposing parties have
the opportunity to cross-examine witnesses and challenge the admissibility or credibility of the
evidence. This process allows for the testing of the evidence's reliability and the arguments made
based on it.

Retention and Disposal: After the conclusion of the trial or legal proceedings, evidence may be
retained for a certain period according to legal requirements or disposed of in accordance with
established protocols. The retention or disposal of evidence must comply with relevant laws and
regulations.

It's important to note that the specific procedures and standards for handling evidence can vary
depending on the jurisdiction and the type of case. Legal professionals, such as law enforcement
personnel, forensic experts, and attorneys, are responsible for ensuring that evidence is collected,
preserved, and presented in accordance with the applicable laws and standards to maintain its
integrity and admissibility in a court of law.

The extraction, preservation, and deposition of legal evidence in digital forensics investigations
involve a systematic and well-documented procedure. Here is an overview of the typical steps
involved:

Planning and Preparation: Understand the scope and objectives of the investigation.
Identify the legal and regulatory requirements that govern the investigation.
Assemble a qualified and authorized forensic team.
Identification and Segregation: Identify the relevant digital devices, systems, or networks that may
contain potential evidence.
Segregate the targeted devices or systems to prevent unintentional alteration or contamination of
the evidence.
Evidence Acquisition: Use proper tools and techniques to acquire a forensic copy of the digital
evidence. This involves creating a bit-for-bit copy of the original data without modifying or
tampering with it.
Maintain the integrity and authenticity of the evidence by employing write-blocking tools or
hardware write-blockers to prevent accidental or intentional modification.
Preservation: Safeguard the acquired evidence by storing it securely. This includes maintaining
proper physical and logical controls to prevent unauthorized access, tampering, or loss.
Utilize encryption to protect the stored evidence, especially if it contains sensitive or confidential
information.
Examination and Analysis:
Conduct a thorough examination and analysis of the acquired evidence using specialized forensic
tools and techniques.
Identify and extract relevant information, such as files, emails, metadata, logs, or network traffic.
Preserve and document the chain of custody for each piece of evidence, including who accessed it
and when.

Introduction to Digital Forensics Page 13


Srinivas University B. Tech. (CSCF)-IV Semester

Documentation: Maintain detailed documentation of all actions taken during the examination and
analysis process.
Record the tools, techniques, and methodologies used.
Document the findings, observations, and conclusions, ensuring that they are clear, accurate, and
objective.
Report Generation: Prepare a comprehensive report that summarizes the investigation process,
findings, and conclusions.
Include relevant technical details, such as the methodologies used, the evidence examined, and the
results obtained.
Clearly present the findings in a manner that is understandable to both technical and non-technical
audiences.
Deposition and Testimony: Present the findings in a court of law, if required.
Be prepared to testify as an expert witness, explaining the methodologies, procedures, and
conclusions of the investigation.
Provide clear and concise answers to questions posed by attorneys or the court.
It is important to note that the specific procedures may vary depending on the jurisdiction, the
nature of the investigation, and the type of digital evidence involved. Consulting with legal experts
and following the guidelines provided by the relevant legal authorities is crucial to ensure
compliance with legal and regulatory requirements.

Value Added Session


Digital forensics investigation tools are specialized software and hardware resources used to
extract, analyze, and preserve digital evidence during forensic investigations. These tools assist
forensic examiners in effectively uncovering and analyzing information from various digital
sources. Here are some commonly used digital forensics investigation tools:

Forensic Imaging Tools:


Tools like EnCase, FTK Imager, and dd (command-line tool) are used to create forensic copies or
images of digital storage media, ensuring the preservation of data integrity.
These tools allow forensic investigators to acquire bit-for-bit copies of storage devices, including
hard drives, solid-state drives (SSDs), USB drives, and memory cards.
Data Recovery Tools:

Tools like GetDataBack, Recuva, and R-Studio are used to recover deleted, lost, or damaged files
from storage media.
These tools employ various techniques to search for and reconstruct data fragments to recover
valuable evidence.
File Carving Tools:

Tools like Scalpel, PhotoRec, and Foremost are used to extract files and data from fragmented or
partially corrupted storage media.
They employ file signature analysis and other methods to identify and reconstruct files based on
their unique file headers, footers, and content patterns.
Keyword and Metadata Analysis Tools:

Introduction to Digital Forensics Page 14


Srinivas University B. Tech. (CSCF)-IV Semester

Tools like Autopsy, X-Ways Forensics, and Encase enable investigators to search for specific
keywords, metadata, or file attributes across large volumes of digital evidence.
These tools assist in locating relevant files, documents, emails, or other pieces of evidence based
on specific criteria.
Registry and Artifact Analysis Tools:

Tools like Registry Viewer, RegRipper, and Forensic Explorer help investigators examine and
analyze the Windows Registry and system artifacts.
They extract valuable information such as user activity logs, installed software, USB device
history, network connections, and more.
Network Forensics Tools:

Tools like Wireshark, NetworkMiner, and tcpdump are used to capture and analyze network
traffic.
These tools allow investigators to examine network packets, analyze protocols, detect intrusions,
and reconstruct network communications.
Mobile Device Forensics Tools:

Tools like Cellebrite UFED, Oxygen Forensic Detective, and Magnet AXIOM are specifically
designed for extracting and analyzing data from mobile devices.
They can recover deleted messages, call logs, multimedia files, app data, and other information
from smartphones and tablets.
Memory Forensics Tools:

Tools like Volatility, Rekall, and WinDbg help investigators analyze the volatile memory (RAM)
of a computer or device.
These tools can extract running processes, open network connections, encryption keys, and other
valuable information not available on disk.
Timeline Analysis Tools:

Tools like Plaso (Log2Timeline), SIFT Workstation, and Timesketch help investigators create
timelines of events based on the timestamps found in various artifacts.
They assist in reconstructing the sequence of activities and provide a visual representation of the
investigation timeline.
Data Visualization Tools:

Tools like Gephi, Palantir, and Tableau enable investigators to visualize and analyze complex
relationships, connections, and patterns within the collected digital evidence.
They help in understanding and presenting the data in a more intuitive and informative manner.
These are just a few examples of the many digital forensics investigation tools available. Each tool
serves a specific purpose and offers unique features and capabilities to aid forensic examiners in
their analysis and reporting tasks. The selection of tools depends on the nature of the investigation,
the types of evidence involved, and the specific requirements of the case.

Introduction to Digital Forensics Page 15


Srinivas University B. Tech. (CSCF)-IV Semester

The main difference between private and public investigation agencies in digital forensics
investigations lies in their organizational structure, clientele, jurisdiction, and funding sources.
Here are some key distinctions:

Organizational Structure:
Private Investigation Agency: Private investigation agencies operate as independent businesses or
companies. They are privately owned and may have a hierarchical structure with management and
employees.
Public Investigation Agency: Public investigation agencies are typically government entities or
law enforcement agencies. They have a defined organizational structure, often with various
departments and specialized units.
Clientele:

Private Investigation Agency: Private agencies primarily serve private clients, including
individuals, corporations, law firms, and other organizations seeking investigative services. They
often handle cases such as corporate espionage, intellectual property theft, fraud, and civil
litigation.
Public Investigation Agency:
Public agencies primarily serve the public interest and government entities. Their clients include
law enforcement agencies, government departments, and prosecutors. They focus on criminal
investigations and may handle cases such as cybercrime, terrorism, and public safety issues.
Jurisdiction:

Private Investigation Agency: Private agencies typically operate within the boundaries defined by
the law of the jurisdiction in which they are based. They may work on cases both domestically and
internationally, depending on their capabilities and the nature of the investigation.
Public Investigation Agency: Public agencies have the authority to conduct investigations within
the jurisdiction in which they are established. They operate under specific legal frameworks and
often have the power to enforce laws, make arrests, and prosecute offenders.
Access to Resources and Authority:

Private Investigation Agency: Private agencies rely on their own resources, expertise, and
partnerships with other organizations or specialists. They do not have direct law enforcement
authority and must collaborate with public agencies when legal enforcement actions are required.
Public Investigation Agency: Public agencies typically have access to greater resources, including
specialized forensic laboratories, dedicated personnel, and legal authority. They often have the
power to obtain search warrants, make arrests, and seize evidence.
Funding:

Private Investigation Agency: Private agencies are funded by their clients, who pay for the
investigative services rendered. The cost is generally borne by the individual or organization
seeking their services.
Public Investigation Agency: Public agencies are funded by taxpayers' money or government
budgets. Their operations are supported by public funds allocated to law enforcement and
government agencies.

Introduction to Digital Forensics Page 16


Srinivas University B. Tech. (CSCF)-IV Semester

It's important to note that while private investigation agencies operate independently, public
agencies often collaborate with them in certain cases, leveraging their expertise and resources.
Additionally, the specific roles, responsibilities, and limitations of private and public investigation
agencies may vary depending on the jurisdiction and legal frameworks in place.

Difference between Encase and Autopsy: Encase and Autopsy are two popular digital forensics
tools used for investigating and analyzing digital evidence. While they share some similarities in
their functionalities, there are also notable differences between the two tools. Here's a comparison:

Company and License:


Encase: Developed by Guidance Software (now part of OpenText), Encase is a commercial tool
that requires a license for usage.
Autopsy: Autopsy is an open-source digital forensics tool maintained by The Sleuth Kit project. It
is freely available and distributed under an open-source license.
User Interface:
Encase: Encase provides a comprehensive and feature-rich graphical user interface (GUI). It offers
a wide range of options, menus, and features, making it a powerful tool for experienced users.
However, it may have a steeper learning curve for beginners.
Autopsy: Autopsy also has a GUI but focuses on providing a user-friendly and intuitive interface.
It aims to simplify the forensic process, making it accessible to both experienced investigators and
newcomers to the field.
File System Support:
Encase: Encase supports a broad range of file systems, including popular ones such as NTFS, FAT,
HFS+, APFS, Ext2/3/4, and more. It also has advanced features for handling complex file system
structures.
Autopsy: Autopsy utilizes The Sleuth Kit libraries and supports various file systems, including
NTFS, FAT, HFS+, Ext2/3/4, ISO9660, and UDF. It also includes support for disk images and
virtual machines.
Automation and Scripting:
Encase: Encase provides robust automation capabilities, allowing users to automate repetitive
tasks and create customized scripts using the Encase EnScript programming language. This
enables advanced scripting and customization for efficient analysis.
Autopsy: Autopsy supports automation through the use of modules and ingest modules. Users can
create custom Python-based modules to automate specific tasks and extend the functionality of the
tool.
Plugin Ecosystem:
Encase: Encase has a wide range of built-in features and capabilities, but it has a more limited
plugin ecosystem compared to Autopsy. However, it does support custom EnScripts for extending
functionality.
Autopsy: Autopsy has a plugin-driven architecture that allows users to install and utilize various
plugins for additional features and analysis capabilities. The plugin ecosystem is actively
developed by the open-source community, providing a wide range of options.
Community and Support:
Encase: Encase has a dedicated user community and provides commercial support. Users can
access official documentation, training, and support services from the vendor.

Introduction to Digital Forensics Page 17


Srinivas University B. Tech. (CSCF)-IV Semester

Autopsy: Autopsy benefits from an active open-source community, with a dedicated user base and
developers who contribute to its ongoing development. Support is available through community
forums, online resources, and community-driven assistance.
Both Encase and Autopsy have their strengths and are widely used in digital forensics
investigations. The choice between the two tools often depends on factors such as budget, specific
requirements of the investigation, user preferences, and the level of technical expertise available.

Assignment-5
Multiple Choice Questions
1. Which of the following is a common challenge in digital forensics?
A) Easy and straightforward recovery of deleted files
B) Limited variety of digital devices and storage media
C) Rapidly evolving technology and encryption methods
D) Consistent and uniform digital evidence across all cases
Answer: C) Rapidly evolving technology and encryption methods

2. What is a significant challenge when dealing with cloud-based data in digital forensics?
A) Lack of available digital forensics tools
B) Inability to recover deleted files from cloud servers
C) Limited storage capacity in cloud environments
D) Obtaining legal permission to access cloud data
Answer: D) Obtaining legal permission to access cloud data

3. Which of the following poses a challenge to digital forensics investigations involving mobile
devices?
A) Mobile device operating systems being resistant to malware attacks
B) Ease of acquiring and analyzing mobile device data
C) Availability of standardized mobile device forensic tools
D) Encryption and passcode protection on mobile devices
Answer: D) Encryption and passcode protection on mobile devices

4. What is a significant challenge in the preservation of digital evidence in digital forensics?


A) Use of tamper-proof digital storage devices
B) Easy replication and duplication of digital evidence
C) Availability of multiple copies of digital evidence
D) Maintaining a strict chain of custody for digital evidence
Answer: B) Easy replication and duplication of digital evidence

5. Which of the following is a legal and ethical challenge in digital forensics?


A) Availability of advanced digital forensics tools
B) Difficulty in analyzing encrypted data
C) Preservation of privacy rights and personal data protection
D) Use of standardized forensic investigation procedures
Answer: C) Preservation of privacy rights and personal data protection

6. What is the primary purpose of intellectual property laws?

Introduction to Digital Forensics Page 18


Srinivas University B. Tech. (CSCF)-IV Semester

A) To protect the interests of large corporations


B) To restrict access to creative works
C) To encourage innovation and creativity
D) To promote monopolies in the market
Answer: C) To encourage innovation and creativity

7.Which type of intellectual property protects original works of authorship, such as literature,
music, and software?
A) Trademark
B) Patent
C) Copyright
D) Trade secret
Answer: C) Copyright

8. What is software piracy?


A) The unauthorized copying and distribution of copyrighted materials
B) The illegal use of trademarks in software
C) The unauthorized use of patented software algorithms
D) The counterfeiting of software packaging and labels

Answer: A) The unauthorized copying and distribution of copyrighted materials

9. Which type of intellectual property protects brand names, logos, and symbols that distinguish
products or services?
A) Copyright
B) Trade secret
C) Trademark
D) Patent
Answer: C) Trademark

10. What is trade secret theft?


A) The illegal copying and distribution of trade secret materials
B) The unauthorized use of patented trade secrets
C) The unauthorized access and acquisition of valuable and confidential business information
D) The counterfeiting of trade secret products
Answer: C) The unauthorized access and acquisition of valuable and confidential business
information

11.What is the primary concern regarding privacy in digital forensics?


A) Protecting the rights of suspects and defendants
B) Preserving the integrity of digital evidence
C) Ensuring the confidentiality of sensitive information
D) Preventing unauthorized access to forensic tools
Answer: A) Protecting the rights of suspects and defendants

12. Which of the following is a privacy consideration when collecting digital evidence?

Introduction to Digital Forensics Page 19


Srinivas University B. Tech. (CSCF)-IV Semester

A) Adhering to chain of custody procedures


B) Using specialized forensic software
C) Conducting keyword searches on suspect devices
D) Sharing evidence with external parties
Answer: A) Adhering to chain of custody procedures

13. In digital forensics, what is meant by data minimization?


A) Reducing the amount of digital evidence collected
B) Encrypting sensitive data during investigations
C) Limiting access to forensic tools and software
D) Anonymizing the identities of individuals involved
Answer: A) Reducing the amount of digital evidence collected

14. What is the purpose of obtaining a legal authorization before conducting digital forensics
investigations?
A) Ensuring compliance with industry standards
B) Protecting the privacy rights of individuals
C) Streamlining the data collection process
D) Validating the accuracy of forensic tools
Answer: B) Protecting the privacy rights of individuals

15. Which principle should guide digital forensics investigators when handling personally
identifiable information (PII)?
A) Transparency
B) Proportionality
C) Data retention
D) Data encryption
Answer: B) Proportionality

16.Which of the following is the primary goal of the criminal justice system in digital forensic
investigations?
A) Identifying potential vulnerabilities in computer networks
B) Collecting and preserving digital evidence for legal proceedings
C) Conducting forensic analysis of digital devices
D) Implementing security measures to prevent cybercrimes

Answer: B) Collecting and preserving digital evidence for legal proceedings

17.What is the role of law enforcement agencies in the criminal justice system for digital forensic
investigations?
A) Developing software tools for data analysis
B) Conducting audits of computer networks
C) Investigating and apprehending cybercriminals
D) Providing technical support for digital forensics laboratories

Answer: C) Investigating and apprehending cybercriminals

Introduction to Digital Forensics Page 20


Srinivas University B. Tech. (CSCF)-IV Semester

18. Which phase of the criminal justice system involves presenting digital evidence in court
proceedings?
A) Investigation phase
B) Prosecution phase
C) Sentencing phase
D) Appeal phase

Answer: B) Prosecution phase

19. What is the purpose of digital forensic experts in the criminal justice system?
A) Developing encryption algorithms for secure communication
B) Assisting in the recovery of lost data from storage devices
C) Analyzing digital evidence and providing expert testimony
D) Conducting risk assessments for organizations' cybersecurity
Answer: C) Analyzing digital evidence and providing expert testimony

20. Which entity is responsible for ensuring compliance with legal and ethical standards in
digital forensic investigations?
A) Digital forensic laboratories
B) Computer emergency response teams (CERTs)
C) Legal professionals and judges
D) Cybersecurity consultants
Answer: C) Legal professionals and judges

21. What is the role of audit/investigative situations in a digital crime scene?


A) Collecting and preserving physical evidence
B) Analyzing network traffic logs
C) Identifying potential witnesses
D) Examining DNA samples
Answer: B) Analyzing network traffic logs

22. Which of the following is a key objective of conducting an audit/investigation in a digital


crime scene?
A) Identifying the motive of the perpetrator
B) Recovering deleted files from a computer
C) Determining the legality of the actions performed
D) Assessing the monetary loss caused by the crime
Answer: C) Determining the legality of the actions performed

23. What is the primary goal of the investigative procedure for evidence extraction, preservation,
and deposition in a court of law?
A) Identifying potential suspects in the case
B) Ensuring the admissibility and integrity of evidence
C) Gathering as much evidence as possible for the case
D) Providing expert testimony in court proceedings
Answer: B) Ensuring the admissibility and integrity of evidence

Introduction to Digital Forensics Page 21


Srinivas University B. Tech. (CSCF)-IV Semester

24. Which step is crucial in the investigative procedure for evidence preservation?
A) Documenting the chain of custody
B) Conducting interviews with witnesses
C) Analyzing the evidence for digital footprints
D) Presenting the evidence in court proceedings
Answer: A) Documenting the chain of custody

25. What is the purpose of the deposition phase in the investigative procedure for legal evidence?
A) To determine the guilt or innocence of the accused
B) To present expert opinions and interpretations of the evidence
C) To cross-examine the witnesses and experts in court
D) To collect additional evidence for the case
Answer: B) To present expert opinions and interpretation

Long Answer Questions

1. Analyze the various challenges encountered in digital forensics.


2. Evaluate the relationship between intellectual property, cybercrime, and the legal issues
surrounding them.
3. Develop strategies for effectively handling privacy issues in digital forensics
investigations.
4. Summarize the role of the criminal justice system in conducting forensic investigations.
5. Assess the significance of audit/investigative situations in the context of digital crime
scenes.
6. Outline the investigative procedure for extracting, preserving, and presenting legal
evidence in a court of law.
7. Examine the technical, legal, and resource challenges associated with digital forensics.
8. Provide an overview of a digital forensics’ investigation tool and its applications.
9. Compare and contrast the features and capabilities of Encase and Autopsy forensic tools.
10. Compare and contrast the procedures followed in private and public digital investigations.

Introduction to Digital Forensics Page 22

You might also like