Please enable JavaScript.
Coggle requires JavaScript to display documents.
Digital Forensics - Coggle Diagram
Digital Forensics
Mobile Device Evidence
pictures and videos
device information
email and text messages, including app-specific messages
global positioning system (GPS) information and history
call history
network connection information and history
mobile device forensics
Susteen Secure View
MOBILedit Forensic Express
Elcomsoft Mobile Forensic Bundle
Oxygen Forensic Detective
Cellebrite UFED
MSAB XRY
Belkasoft Evidence Center
Overview of Computer Crime
a computer can be:
instrument
repository
target
types of computer crime
identity theft
exfiltrating data
cyberstalking/harassment
online fraud
nonaccess computer crimes
forensic methodologies
consider data volatility
develop an analysis plan first
do not exceed your knowledge
enforce the rules of evidence
minimize original data handling
forensic standards and frameworks
The Digital Forensic Research Workshop Framework
The Scientific Working Group on Digital Evidence Framework
U.S. Department of Defense Forensic Standards
An Event-Based Digital Forensic Investigation Framework
software products
Helix
AnaDisk Disk Analysis
Kali Linux
OSForensics
Forensic Toolkit
EnCase
WinHex
memdump
dd
The Sleuth Kit
Eric Zimmerman Tools
Kroll Artifact Parser and Extractor
Introduction to Digital Forensics
always gather evidence and proof
evidence types
documentary evidence
testimonial evidence
demonstrative evidence
real evidence
digital forensic scientists should be familiar with:
networks
software
file systems
operating systems
storage devices
computer memory
hardware
most common OSs
Linux
MacOS
Windows