0% found this document useful (0 votes)
4 views

Eti report

The document discusses the importance of digital forensics, outlining its role in legal and cybersecurity investigations. It details six fundamental rules for handling digital evidence to ensure its integrity and admissibility in court. The history of digital forensics is also briefly covered, highlighting key developments and the evolution of the field.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views

Eti report

The document discusses the importance of digital forensics, outlining its role in legal and cybersecurity investigations. It details six fundamental rules for handling digital evidence to ensure its integrity and admissibility in court. The history of digital forensics is also briefly covered, highlighting key developments and the evolution of the field.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 10

BHARATI VIDYAPEETH

Institute of Technology (Polytechnic),Navi Mumbai


(ACADEMIC YEAR: - 2024-2025)
(MICRO PROJECT)

Emerging trends in computer and


information technology

CLASS: -TYCM1 COURSE AND CODE: ETI(22618)

TOPIC: - Digital Forensic Rules

SUBMITTED BY: -
3138- Siddhi Londhe

Guided by Prof. Reena Gharat


Table of Content

 Introduction

 History

 Rules

 Conclusion
Introduction

Digital forensics is a critical field that involves the identification,


collection, preservation, and analysis of digital evidence to support
investigations in legal and cybersecurity contexts.
To ensure that evidence remains admissible in court and
maintains its integrity, strict rules and procedures must be followed
during forensic investigations. The digital forensics rules provide
guidelines for handling digital evidence in a way that prevents
contamination, ensures accuracy, and maintains a proper chain of
custody.
These rules are essential for law enforcement, cybersecurity
professionals, and forensic analysts to conduct investigations
effectively and ethically.
The six fundamental rules of digital forensics include:
1. Do Not Examine the Original Media – Ensuring the integrity of
evidence by working on forensic copies rather than the original
storage device.
2. Use Forensically Sterile Media – Preventing contamination by
copying evidence onto new or sanitized storage devices.
3. Create an Exact, Bit-by-Bit Copy – Ensuring that forensic copies are
identical to the original, including deleted files and hidden data.
4. Protect the Computer and Data During Acquisition – Using write-
blockers and forensic tools to prevent data modification.
5. Prevent Any Modification During Examination – Conducting the
analysis in a read-only environment to preserve evidence integrity.
6. Maintain a Clear Chain of Custody – Documenting every individual
who accessed the evidence to ensure legal accountability.
By following these rules, forensic investigators can ensure that
digital evidence remains reliable, credible, and legally admissible in
court.
History

The field of pc forensics began in 1980s when personal computers


became a viable possibility for the buyer.
In 1984, an associate Federal Bureau of Investigation program was
created, which was referred to as magnet media program.
It is currently referred to as Computer Analysis and Response Team
(CART).
Michael Anderson, the Father of Computer Forensics, came into
limelight during this period.
International Organization on Computer Evidence (IOCE) was formed
in 1995.
In 1997, the great countries declared that law enforcement
personnel should be trained and equipped to deal with sophisticated
crimes.
In 1998, INTERPOL Forensic Science symposium was apprehended.
In 1999, the FBI CART case load goes beyond 2000 case examining,
17 terabytes of information.
In 2000, the first FBI Regional Computer Forensic Laboratory was
recognized.
In 2003, the FBI CART case load exceeds 6500 cases, examining 782
terabytes of information.
Rules

While performing digital forensics investigation, the


investigator should follow the given rules:

Rule 1. An examination should never be performed on


the original media.

Rule 2. A copy is made onto forensically sterile media.


New media should always be used if available.
Rule 3. The copy of the evidence must be an exact, bit
by-bit copy.(Sometimes referred to as a bit-stream
copy).
Rule 4. The computer and the data on it must be
protected during the acquisition of the media to ensure
that the data is not modified.

Rule 5. The examination must be conducted in such a


way as to prevent any modification of the evidence.
Rule 6. The chain of custody of all evidence must be
clearly maintained to provide an audit log of whom
might have accessed the evidence and at what time.

Conclusion
Digital forensics plays a crucial role in investigating cybercrimes, legal
disputes, and security breaches. The six fundamental rules of digital
forensics ensure that evidence is handled with integrity, accuracy,
and accountability.
By adhering to these rules, forensic investigators can:
Preserve the authenticity of digital evidence.
Prevent contamination or modification of data.
Ensure that findings are legally admissible in court.
Maintain transparency and accountability through a clear chain of
custody.
Failure to follow these principles can lead to evidence being deemed
inadmissible, compromising investigations and legal proceedings.
Therefore, strict adherence to forensic guidelines is essential for
maintaining trust in digital investigations and upholding justice.
As technology evolves, digital forensics must continuously adapt, but
the core principles of evidence preservation, integrity, and ethical
handling will always remain fundamental to the field.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy