0% found this document useful (0 votes)
13 views4 pages

eti_script

The document outlines the process and importance of digital forensics in investigating cybercrimes, detailing the steps from identification to presentation of evidence. It emphasizes the significance of digital evidence, the history of digital forensics, and ethical norms that investigators must follow. Additionally, it introduces various models and processes for conducting thorough investigations while maintaining legal integrity.

Uploaded by

saeedarwatkar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views4 pages

eti_script

The document outlines the process and importance of digital forensics in investigating cybercrimes, detailing the steps from identification to presentation of evidence. It emphasizes the significance of digital evidence, the history of digital forensics, and ethical norms that investigators must follow. Additionally, it introduces various models and processes for conducting thorough investigations while maintaining legal integrity.

Uploaded by

saeedarwatkar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

Slide 1:

"It’s late at night, and a multinational company suddenly notices that millions of dollars have disappeared from
their accounts. Their security team scrambles to find out what happened. Was it an insider job? A sophisticated
hacker? Or just a system error? Panic spreads through the company, and all eyes turn to a special team—Digital
Forensics Investigators. Their mission? To uncover the truth, trace digital footprints, and find the culprit before
it’s too late."

"If you were in charge of this investigation, where would you start? Would you check the emails? Look into the
network logs? Or maybe examine the deleted files?"

"In today’s digital world, every click, every login, and even deleted files leave traces. Cybercriminals think they
can hide, but digital forensics can reveal the truth. In this presentation, we will explore how investigators solve
crimes in the digital world, just like detectives solve cases in the real world!"

Slide 2:
Digital Evidence

 Digital evidence is any electronic data that can be used to prove a crime or suspicious activity.
 It includes documents, emails, chat messages, images, videos, browsing history, and system logs.
 This evidence is found in computers, mobile devices, cloud storage, and network systems.
 Just like physical evidence (fingerprints or DNA), digital evidence helps investigators understand what
happened, when, and who was involved.

Digital Forensics

 Digital forensics is the process of identifying, collecting, analyzing, and preserving digital evidence.
 Experts use special tools to recover deleted or hidden data from devices.
 It helps in solving cybercrimes, data breaches, hacking cases, financial fraud, and identity theft.
 The goal is to ensure the evidence is reliable and legally acceptable in court.
 Investigators follow strict procedures to maintain the integrity of the evidence and prevent tampering.

Slide 3: History of Digital Forensics


In 1980, Digital forensics began as computers became more common.

In 1984, The FBI formed the Computer Analysis and Response Team (CART) for cyber investigations.

In 1997, The International Organization on Computer Evidence (IOCE) set forensic guidelines.

In 1998, Cybercrime laws were introduced, and forensic tools became widely used.

In 1999, The Scientific Working Group on Digital Evidence (SWGDE) defined digital evidence rules.

In 2000, Courts started accepting digital evidence, and tools like EnCase and FTK were developed.
In 2003, The Patriot Act increased digital surveillance, and mobile forensics became important.

Slide 4: Detailed Explanation of Digital Forensics Investigation Process


This slide describes the systematic steps followed in a digital forensic investigation to collect, analyze, and
present digital evidence properly. Each step ensures that evidence is handled carefully and remains valid for
legal use.

1. Identification: The first step is to detect and recognize digital evidence from different sources like
computers, mobile phones, emails, network logs, or cloud storage. Investigators must determine what type of
data is relevant to the case.

2. Collection: After identification, evidence is collected and securely stored to avoid alteration or loss.
Specialized forensic tools are used to make exact copies (bit-by-bit images) of the data.

3. Preservation: The collected evidence must be protected from tampering, unauthorized access, or accidental
loss. Hash values (unique digital fingerprints) are generated to maintain integrity and prove that the evidence
has not been altered.

4. Analysis: Experts examine and extract useful information from the data. Deleted files, hidden data, encrypted
files, or suspicious activities are analyzed using forensic tools. The goal is to find clues that connect digital
evidence to the crime.

5. Documentation: Investigators record all findings, steps taken, and tools used in a detailed forensic report.
Proper documentation ensures that the process is transparent and follows legal standards.

6. Presentation: The final step is to present the findings in court or to law enforcement agencies. The report
must be clear, well-structured, and easy to understand for judges, lawyers, or investigators. Investigators may be
asked to explain technical details in simple terms to help legal professionals understand the evidence.

Slide 6:
This slide presents the Abstract Digital Forensic Model (ADFM), which describes the step-by-step process of
handling digital evidence in forensic investigations.

1. Identification: In identification step, it finds and recognizes the digital evidences related to the crime.

2. Preservation: In Preservation step, it Protects evidence from being changed, deleted, or damaged. Also it
makes copies of data to ensure that the original data remains untouched.

3. Collection: After preservation the identified evidences are collected carefully and securely. Also it maintains
records of who handles the evidence to ensure authenticity.

4. Examination: In this step, it inspects and extracts important data from collected evidence to recover hidden,
deleted, or encrypted files.
5. Analysis: After examination it studies the extracted data to find clues about the crime.

6. Reconstruction: In this it rebuilds the sequence of events using analyzed data to understand how and when
the crime took place.

7. Documentation: As it says, it records all findings, methods, and tools used in the investigation.

8. Presentation: In this it presents the evidences and findings in court or to law enforcement and explains the
results in a clear and understandable way.

9. Returning Evidences: At last it gives back the evidence to its owner if allowed by law to ensure proper legal
procedures are followed.

Slide 7: Integrated Digital Investigation Process (IDIP)


This process helps investigators to solve crimes by combining physical and digital evidence. It ensures a
structured way to analyze criminal activities.

1. Readiness: In this step, Investigators prepare tools, techniques, and training. Rules are set for handling
evidence properly.

2. Deployment: The investigation team is sent to the crime scene. Necessary tools and technology are set up.

3. Physical Crime Investigation: The crime scene is examined for physical evidence. Items like fingerprints,
documents, or devices are collected.

4. Digital Crime Investigation: Electronic devices are analyzed for digital evidence. Emails, chats, browsing
history, and files are checked.

5. Review: The entire process is evaluated for accuracy. Investigators improve methods for future cases.

Slide 8: Extended Model of Cybercrime Investigation (EMCI)]


This model explains how cybercrimes are investigated step by step. It ensures that digital evidence is collected,
analyzed, and used properly.

1. Awareness: Detecting suspicious activities or cybercrimes.

2. Authorization: Getting legal permission to investigate.

3. Planning: Creating a strategy for the investigation.

4. Notification: Informing the authorities or relevant people.

5. Search for Identify Evidence: Finding possible digital evidence from devices.
6. Collection of Evidence: Gathering digital proof carefully.

7. Transport of Evidence: Moving evidence securely to an investigation lab.

8. Storage of Evidence: Keeping evidence safe for further analysis.

9. Examination of Evidence: Analyzing data to find useful information.

10. Hypothesis: Making assumptions based on evidence.

11. Presentation of Hypothesis: Explaining findings to investigators or experts.

12. Proof/Defense of Hypothesis: Justifying the conclusions with facts.

13. Dissemination of Information: Sharing results with law enforcement or courts.

Slide 10: General Ethical Norm


This slide explains the ethical rules that digital investigators should follow.

1. Be Honest: He should always tell the truth and avoid misleading information.

2. Keep Information Private: He should not share sensitive data with unauthorized people.

3. Follow the Law: He should always work within legal boundaries and respect laws.

4. Protect Evidence: He should keep digital evidence safe and prevent any tampering.

5. Record Everything: He should maintain proper records of all actions and findings.

Slide 11: Unethical Norms


This slide lists wrong actions that should be avoided in digital investigations. These actions can harm trust,
privacy, and justice.

1. Changing Evidence: He should not modify or delete digital evidence.

2. Sharing Secrets: He should not reveal private or confidential data without permission.

3. Breaking Laws: He should not ignore or violate legal rules which will lead to serious consequences.

4. Not Keeping Records: If he fails to keep document then it may cause confusion and mistakes.

5. Using Data Wrongly: He should not misuse digital information for personal gain.

You might also like