In simple terms, computer or digital forensic evidence analysis is the scientific collection of data recovered or stored from a computer storage device that can be used against a criminal in a court of law. In order for the information to be used in court, it should be collected before submission; therefore, a number of recommendations are proposed to ensure that the information collected meets the intended integrity. Information collected digitally from computers or media storage applications has protocols that must be followed during the process. The order of collection of digital information primarily determines the life expectancy of the collected information (Eoghan, 2004, p. 74). It is necessary to change information collection procedures as there are changes in the field of information technology. In this regard, all the information collected is sometimes determined by the type of tools and instruments provided by the vendors. Investigative agencies should be keen to ensure that they engage the services of competent vendors who are up to date with current technology and provide their tools at an attractive price (Eoghan, 2004, p. 74). Vendors and collection agencies should understand that current technology has removable memory devices where information can be stored and cannot be recovered in hard drives (Eoghan & Gerasimos, 2008, p. 93). There are also malware that can be stored in RAM and cannot be tracked on hard drives, which means that information gathering tools and strategies should be shaped in such a way that they can overcome data storage and theft tricks. data (Eoghan & Gerasimos, 2008, p.93). From experience, when dealing with computers it is possible to reveal the trick that is generated by using co...... half paper ......any reasonable doubt that the accused is responsible for the crime for which he is accused. One of the oversights that can occur when collecting digital evidence is that digital storage devices are intact and cannot lose the collected data; To pass supervision, it is important to have a backup of all information collected about a crime. ReferencesCarrier, B. D. (2006). Risks of real-time digital forensics. Communications of the ACM, 49(2), 56-61.Eoghan, C. (2004). Digital Evidence and Cybercrime, 2nd ed. London, UK: Elsevier.Eoghan, C., & Gerasimos, S. (2008). The impact of full disk encryption on digital forensics. Operating Systems Review, 42 (3), 93-98.Henry, P. (2009, September 12). Best practices in digital evidence collection. Retrieved from http://computer-forensics.sans.org/blog/2009/09/12/best-practices-in-digital-evidence-collection/
tags