- Digital Forensics and Incident Response
- Gerard Johansen
- 257字
- 2021-07-02 18:49:46
Proper evidence handling
The proper handling and securing of evidence is critical. Mistakes in how evidence is acquired can lead to that evidence being tainted and subsequently not forensically sound. In addition, if an incident involves potential legal issues, critical evidence can be excluded from being admitted in a criminal or civil proceeding. There are several key tenets of evidence handling that need to be followed:
- Altering the original evidence: Actions taken by digital forensic examiners should not alter the original evidence. For example, a forensic analyst should not access a running system if they do not have to. It should be noted that some of the tasks that will be explored have the potential to alter some of the evidence. By incorporating proper documentation and having a justifiable reason, digital forensic examiners can reduce the chance that evidence will be deemed tainted.
- Document: One central theme you will often hear in law enforcement is the phrase if you didn't write it down, it didn't happen. This is especially true when discussing digital forensics. Every action that is taken should be documented in one way or another. This includes detailed notes and diagrams. Another way to document is photographs. Proper documentation allows for examiners to reconstruct the chain of events if ever the integrity of evidence is called into question.
There are a number of resources available from various law enforcement agencies on proper evidence handling in the field. You should become familiar with these procedures.The following guides are utilized by law enforcement agencies:
http://www.crime-scene-investigator.net/SeizingElectronicEvidence.pdf
https://www.ncjrs.gov/pdffiles1/nij/219941.pdf
http://www.iacpcybercenter.org/wp-content/uploads/2015/04/digitalevidence-booklet-051215.pdf
http://www.crime-scene-investigator.net/SeizingElectronicEvidence.pdf
https://www.ncjrs.gov/pdffiles1/nij/219941.pdf
http://www.iacpcybercenter.org/wp-content/uploads/2015/04/digitalevidence-booklet-051215.pdf
推薦閱讀
- Rust編程:入門、實戰與進階
- 信息安全技術
- JavaScript前端開發與實例教程(微課視頻版)
- Java程序設計入門
- Babylon.js Essentials
- Mastering Backbone.js
- OpenCV with Python By Example
- Troubleshooting Citrix XenApp?
- Mastering Gephi Network Visualization
- Android嵌入式系統程序開發(基于Cortex-A8)
- 原型設計:打造成功產品的實用方法及實踐
- Android智能手機APP界面設計實戰教程
- Java EE程序設計與開發實踐教程
- Raspberry Pi Robotic Projects
- Swift Essentials(Second Edition)