software

Understand-Anti-forensics-and-their-goals

Understand Anti-forensics and their goals

Understand Anti-forensics and their goals, also referred to as counter forensics, may be a set of techniques that attackers or perpetrators use so as to avert or sidetrack the forensic investigation process or attempt to make it much harder. These techniques negatively impact the number and quality of evidence from a criminal offense scene, thereby making the forensic investigation process difficult. Therefore, the investigator may need to conduct a few more additional steps so as …

Understand Anti-forensics and their goals Read More »

Understand-Acquiring-RAID-Disks

Understand Acquiring RAID Disks

Understand Acquiring RAID Disks may be challenging for forensics examiners due to the RAID system design, configuration, and size. The greatest concern is the size of the RAID system, as many systems are growing into many terabytes of data. Copying small RAID systems to one large disk is possible with the availability of larger disks. Investigators should use a proprietary format acquisition with compression to store more data in small storage capacities. Acquiring RAID Disks …

Understand Acquiring RAID Disks Read More »

Data-Acquisition-and-Duplication-Tools-Software

Data Acquisition and Duplication Tools: Software

Data Acquisition and Duplication Tools: Software in this article explain different types of software which is using in data acquision and duplication data tool. EnCase Forensic Source: https://www.guidancesoftware.com EnCase is a popular multi-purpose forensic platform which includes many useful tools to support several areas of the digital forensic process. This tool can collect a lot of data from many devices and extracts potential evidence. It also generates an evidence report. EnCase Forensic can help investigators …

Data Acquisition and Duplication Tools: Software Read More »

ISO-27001-Annex-A.18-Compliance

ISO 27001 Annex : A.18 Compliance

ISO 27001 Annex : A.18 Compliance in this article explain Compliance with Legal and Contractual Requirements, Identification of Applicable Legislation and Contractual Requirements and Intellectual Property Rights this controls. A.18.1 Compliance with Legal and Contractual Requirements It’s objective is to protect against violation of legal, statutory, regulatory, or contractual obligations relating to information security and any other security requirements. A.18.1.1 Identification of Applicable Legislation and Contractual Requirements Control- Each of these information systems and organizations …

ISO 27001 Annex : A.18 Compliance Read More »

Duplicate-the-Data-&-Recover-Data-Lost

Duplicate the Data & Recover Data Lost

Duplicate the Data & Recover Data Lost this article explain in investigation evidence how should be duplicate data should be recover and which software are use for recovery data. Duplicate the Data (Imaging) Performing the investigation on the original evidence can misdirect the investigation to different results and could make the original evidence vulnerable. Data duplication is an important step in securing the original evidence. Investigating the original evidence can cause damage to the identity …

Duplicate the Data & Recover Data Lost Read More »

Review-Policies-and-Laws-of-Forensic-Investigation

Review Policies and Laws of Forensic Investigation

Review Policies and Laws of Forensic Investigation it is essential to be aware of the laws that will be applicable to the investigation, including the organization’s internal policies, before starting the investigation process. Identify possible concerns related to applicable federal statutes, state statutes, and local policies and laws. Applicable federal statutes include the Electronic Communications Privacy Act of 1986 (ECPA) and the Cable Communications Policy Act (CCPA), both as amended by the USA PATRIOT ACT …

Review Policies and Laws of Forensic Investigation Read More »

Forensics Software

Forensics Software

Forensics Software this blog is explaining which of which of the software are using in forensic investigation in detail. Password Cracking Tool: Cain & Abel Source: http://www.oxid.it Cain & Abel is a password recovery tool for Microsoft Operating Systems. It allows recovery of various kinds of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force, and Crypt analysis attacks, recording VolP conversations, decoding scrambled passwords, recovering wireless network keys, revealing password boxes, uncovering …

Forensics Software Read More »

Building-a-Forensics-Workstation

Building a Forensics Workstation

Define the computer forensics approach clearly before Building a Forensics Workstation. For developing a forensics laboratory, the total estimated cost incurred to meet the accreditation standards of a standardized body that certifies labs will be the deciding factor for fund allocation. Funding is important in order for a successful implementation of the computer forensics lab. Calculate the yearly budget allocation for a forensics lab, based on the previous year’s statistics as well as estimated trends …

Building a Forensics Workstation Read More »

Computer-Forensics-Lab

Setting Up a Computer Forensics Lab

A Computer Forensics Lab (CFL) is a designated location for conducting computer-based investigation of the collected evidence in order to solve the case and find the culprit. The lab houses the instruments, software and hardware tools, suspect media, and the forensic workstations required to perform investigation of all types. Setting up a forensics lab includes: Planning and budgeting Before planning and evaluating the budget for the forensic investigation case, consider the following: Break down costs …

Setting Up a Computer Forensics Lab Read More »

CyberCrime

Types of Cybercrimes

Cybercrimes refers to “any illegal act that involves a computer, its systems, or its applications.” Once investigators start investigating a criminal offense scene, they need to remember that under computer forensics, Cybercrimes are most frequently intentional and not accidental. the sort of a Cybercrime depends on the tools of the crime and its target. The tools of the crime ask various hacking tools wont to commit the crime. They include the pc or workstation used …

Types of Cybercrimes Read More »