How to Transfer Raw Infomation into a Presentation

Like any other branch of applied science, Digital Forensics has its protocols and a structured process. It can be divided into five stages: identifying, preserving, analysing, documenting, and representing though there might be much more smaller steps.

The 5 steps to analise a crime scene

1. Identification

The first stage implies the topic of investigation goals and required resources. The analysts also identify the evidence, the type of data they deal with (photos, hardware, apps, text, or data), the reliability of the software/hardware, and the devices the data is stored on. Digital forensics specialists work with all kinds of electronic storage devices: hard drives, mobile phones, personal computers, tablets, software, and files.

2. Preservation

At this stage, analysts ensure that the data is isolated and preserved. Usually, it means that no one can use the device until the end of the investigation, so the evidence remains secure. Analysts also usually create a copy of the real code so that even if the original copy is stolen or modified, there is a backup.

3. Analysis

The analysis stage includes a deep systematic search for any relevant evidence. The specialists work with both system and user files and data objects. They will scroll through messages or check where they have been. Based on the found evidence, the analysts draw conclusions. The specialists will check and refine this in the end.

4. Documentation

At this stage, all the found relevant evidence is documented. It helps to extend the crime scene and prompts investigation. Any digital evidence is recorded together with the photos, sketches, and crime scene mapping. This document can be presented straight to the judge.

5. Reporting

At the final stage, all evidence and conclusions are reported according to forensics protocols, which include the methods and procedures of the analysis, data, and their explanation in a court room. Lastly, the jury will decide about this.

This page is all about analysis

You can only find this by highlighting the page. You only can see it by highlighting because of some changes to HTML. This also can be a part of reverse stegronogrophy. This is the fifth message!