Framework For Digital Forensic Evidence Collection With Chain of Custody (Coc)
Framework For Digital Forensic Evidence Collection With Chain of Custody (Coc)
1. This includes determining what type of device or system is being examined and what type of data is stored on it.
2. Once this has been established, the next step is to create an image or copy of the data on the device or system. This image will be used as
3. The next step in digital forensics acquisition is to analyze the image or copy created in order to identify any potential evidence that may
be present. This includes examining filesystems, registry entries, application logs, and other areas where data may be stored. Once any
potential evidence has been identified, it must then be extracted from the image or copied to preserve its integrity and authenticity.
4. Once all relevant evidence has been extracted from the image or a copy has been created during digital forensics acquisition, it must then be
analyzed further in order to determine its relevance and value as evidence. This analysis typically involves examining file headers and
footers, analyzing metadata associated with files, examining application logs for suspicious activity, and other techniques designed to
Once investigators understand which types of data are stored on a computer system and how it is
stored, they can then begin to prioritize their efforts when collecting and analyzing evidence based
on the order of volatility.
One of the most common methods of acquiring digital evidence is disk imaging. Disk imaging involves
making an exact copy of all data stored on a hard drive or another storage device. This copy can then be
analyzed by forensic investigators without altering the original data on the drive.
Disk imaging can also be used to create backups of important data, which can then be used if the original
data is lost or corrupted.
When performing disk imaging for Windows forensics, several steps must be taken to ensure that all relevant
data is captured and preserved properly.
Finally, once the image has been created, it should be verified using checksums/hashing, which are used to
verify the integrity of digital evidence.
A checksum is a unique value generated by a mathematical algorithm based on the data contained in a file.
By comparing the checksum of an original file to that of a copy, investigators can determine if the copy has
been altered or tampered with.
Checksums are crucial in detecting evidence tampering and ensuring that evidence is admissible in court to
ensure its accuracy and integrity before being stored for further analysis.