Uploaded by Kim Tan

DSF task2

advertisement
Evidence gathering strategy and method
*The step by step process of how to handle an evidence, exp making a copy,
hashing it*
Firstly, the parties involved in this incident must be identified, in our case, the
parties involved consist of Bruce Armiter and the highest bidder for the CF card.
After receiving the CF card from the company, the first step is to perform a hash
function by using hashing software such as Hash Tool or HashMyFiles on the CF
card to be used as an evidence in a later stage to show that the CF card has not
been modified in any way during the process from identifying the CF card to
showing it as an evidence in court. Before analyzing the CF card, the CF card’s
data needs to be preserved by duplicating it to prevent evidence contamination
during the analyze process. Duplication of data can be performed by using Win32
Disk Imager. After that, data recovery needs to be performed on the duplicated
data to recover any deleted data that might be useful to the investigation. After
that, the duplicated data needs to be filtered to identify data that are more
relevant to the case. After that, the extraction and analyzation of CF card’s data
can be performed by using EnCase.
Download