{"id":2243,"date":"2022-02-22T11:28:20","date_gmt":"2022-02-22T11:28:20","guid":{"rendered":"https:\/\/www.akgvg.com\/blog\/?p=2243"},"modified":"2022-02-24T06:37:18","modified_gmt":"2022-02-24T06:37:18","slug":"digital-forensic","status":"publish","type":"post","link":"https:\/\/www.akgvg.com\/blog\/digital-forensic\/","title":{"rendered":"Digital Forensic"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-2245\" src=\"https:\/\/www.akgvg.com\/blog\/wp-content\/uploads\/2022\/02\/Digital-Forensic.jpeg\" alt=\"Digital Forensic\" width=\"1000\" height=\"1000\" srcset=\"https:\/\/www.akgvg.com\/blog\/wp-content\/uploads\/2022\/02\/Digital-Forensic.jpeg 1000w, https:\/\/www.akgvg.com\/blog\/wp-content\/uploads\/2022\/02\/Digital-Forensic-300x300.jpeg 300w, https:\/\/www.akgvg.com\/blog\/wp-content\/uploads\/2022\/02\/Digital-Forensic-150x150.jpeg 150w, https:\/\/www.akgvg.com\/blog\/wp-content\/uploads\/2022\/02\/Digital-Forensic-768x768.jpeg 768w, https:\/\/www.akgvg.com\/blog\/wp-content\/uploads\/2022\/02\/Digital-Forensic-230x230.jpeg 230w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/p>\n<p style=\"text-align: justify;\">The Digital era of computers, devices, and mobile applications has proved to be a blessing for fraud and unethical practices, as it has moved to new dimensions and grown exponentially. The same digital era can also be utilized for fraud detection with the help of digital forensic tools. <a href=\"https:\/\/www.akgvg.com\/forensic-accounting.php\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Digital forensic<\/strong><\/a> can help organizations to identify, recover, examine, and present the data or documents in the court of law which is obtained from digital devices.<strong>\u00a0<\/strong><\/p>\n<h3 style=\"text-align: justify;\"><span style=\"text-decoration: underline;\"><strong>Following are the key steps of digital forensics<\/strong><\/span><\/h3>\n<ol>\n<li><span style=\"text-decoration: underline;\"><strong>Identification<\/strong><\/span>: W<span style=\"font-size: 14px; text-align: justify;\"><span style=\"font-size: 14px; text-align: justify;\">hat set of digital data that require to be retrieved, where it is stored, how it is stored, what operating system is used<\/span><\/span>&nbsp;<\/li>\n<li><span style=\"text-decoration: underline;\"><strong>Preservation<\/strong><\/span>: <span style=\"font-size: 14px; text-align: justify;\"><span style=\"font-size: 14px; text-align: justify;\">After identifying the potential data, it is isolated, and copied safely, while the original copy is preserved to maintain the value or integrity of the digital evidence.<\/span><\/span>&nbsp;<\/li>\n<li><span style=\"text-decoration: underline;\"><strong>Indexing<\/strong><\/span>: <span style=\"font-size: 14px; text-align: justify;\"><span style=\"font-size: 14px; text-align: justify;\">Converting the data in readable form for further analysis and log of data gathered is maintained in the form of a chain of custody.<\/span><\/span>&nbsp;<\/li>\n<li><span style=\"text-decoration: underline;\"><strong>Analysis<\/strong><\/span>: T<span style=\"font-size: 14px; text-align: justify;\"><span style=\"font-size: 14px; text-align: justify;\">he examination and review of the data are performed on the copied file with help of sophisticated forensic or analytical tools.<\/span><\/span>&nbsp;<\/li>\n<li><span style=\"text-decoration: underline;\"><strong>Reporting in the court of law<\/strong><\/span>: <span style=\"font-size: 14px; text-align: justify;\"><span style=\"font-size: 14px; text-align: justify;\">Review report and digital evidence are made to be presented in the court of law in which the interpretation of the analysis is summarised and presented in a legally acceptable manner.<\/span><\/span>&nbsp;<\/li>\n<\/ol>\n<p style=\"text-align: justify;\">The tools utilized for analyzing the pieces of evidence need to comply with certain standards for it to be accepted by the court of law. There are many tools available for specific requirements of the investigation such as Encase or FTK Imager that can duplicate the device without harming the evidence. Oxygen and Cellebrite UFED that is targeted for their utilization in mobile forensics, etc.<\/p>\n<p style=\"text-align: justify;\">Every country has its own rules and regulations regarding the collection and admissibility of the evidence in a court of law. The motive is to maintain the authenticity and integrity of the data gathered and presented. It should be consistent throughout its life and preserve its hash value.<strong>\u00a0<\/strong><\/p>\n<blockquote>\n<p style=\"text-align: justify;\"><strong><em>\u201cThere is enough in this world for every man\u2019s need, but there isn\u2019t enough for every man\u2019s greed\u201d \u2013 Mahatma Gandhi<\/em><\/strong><\/p>\n<\/blockquote>\n<p style=\"text-align: justify;\">This content is meant for information only and should not be considered as an advice or legal opinion, or otherwise. <a href=\"https:\/\/www.akgvg.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>AKGVG &amp; Associates<\/strong><\/a> does not intend to advertise its services through this.<\/p>\n<p style=\"text-align: justify;\">Posted by:<\/p>\n<p style=\"text-align: justify;\">CA Ankit Salot<\/p>\n<p style=\"text-align: justify;\">AKGVG &amp; Associates<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Digital era of computers, devices, and mobile applications has proved to be a blessing for fraud and unethical practices, as it has moved to new dimensions and grown exponentially. The same digital era can also be utilized for fraud detection with the help of digital forensic tools. Digital forensic can help organizations to identify,&#8230;<\/p>\n","protected":false},"author":1,"featured_media":2245,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[102],"tags":[573],"class_list":["post-2243","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-forensic","tag-digital-forensic"],"_links":{"self":[{"href":"https:\/\/www.akgvg.com\/blog\/wp-json\/wp\/v2\/posts\/2243","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.akgvg.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.akgvg.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.akgvg.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.akgvg.com\/blog\/wp-json\/wp\/v2\/comments?post=2243"}],"version-history":[{"count":3,"href":"https:\/\/www.akgvg.com\/blog\/wp-json\/wp\/v2\/posts\/2243\/revisions"}],"predecessor-version":[{"id":2253,"href":"https:\/\/www.akgvg.com\/blog\/wp-json\/wp\/v2\/posts\/2243\/revisions\/2253"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.akgvg.com\/blog\/wp-json\/wp\/v2\/media\/2245"}],"wp:attachment":[{"href":"https:\/\/www.akgvg.com\/blog\/wp-json\/wp\/v2\/media?parent=2243"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.akgvg.com\/blog\/wp-json\/wp\/v2\/categories?post=2243"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.akgvg.com\/blog\/wp-json\/wp\/v2\/tags?post=2243"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}