Towards Fact-Based Digital Forensic Evidence Collection Methodology

Digital Forensic is the fundamental property of information system security. It plays an important role to find out digital crime in the cyber world. A key aspect of digital forensic is how to collect the evidence and represent it in court for legal action. A primary concern of digital forensic evidence is to make it as a scientific evidence. So whenever verify the evidence it will give the same result. Since Forensic Science is an integrate science. Therefore, medical evidence is an integral part of forensic methodical research. Using the forensic methodical research such as collecting information and present it on the courtroom. So, this is of proof technology symbolizing the knowledge of collection information by establish methodical research. For example, to make a DNA profile, going after the establish standard protocol to produce a DNA account. So, by evaluating it thousand time it is going to supply the same result. This can be a establish guide of science. Whenever we apply this guideline in the courtroom it'll called scientific Evidence. Evidence is whatever demonstrates, clarifies or shows the reality of an undeniable fact or point involved. Traditionally there's been amount of resistance to the approval of new varieties of proof that emerge because of this of changing technology. Many countries on the globe have started using digital proof including Malaysia. The amendment to Evidence Act 1950 (Amendment 2012) 90A, 90B and 90C in 1993 has provided for the admissibility of 'computer-generated documents' in both civil and criminal proceedings. However, these rapid changes of technology are having a serious effect on digital forensics to explore the Improvement of Digital forensics from various aspect, legal concern of digital crime and the way to get and analysis the digital fact-based substantiation. And suggesting the digital evidence which is admissible to court that treat as scientific evidence. Due to the changing of technology we suggest digital evidence collection methodology.

[1]  Alan T. Sherman,et al.  Acquiring forensic evidence from infrastructure-as-a-service cloud computing: Exploring and evaluating tools, trust, and techniques , 2012, Digit. Investig..

[2]  Sarah Mocas,et al.  Building theoretical underpinnings for digital forensics research , 2004, Digit. Investig..

[3]  Dan Farmer,et al.  Forensic Discovery , 2004 .

[4]  Gary C. Kessler,et al.  Computer Forensics: Principles and Practices , 2006 .

[5]  John Liederbach,et al.  Digital Crime and Digital Terrorism , 2005 .

[6]  Michael Ligh,et al.  Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code , 2010 .

[7]  Harlan Carvey,et al.  Digital Forensics with Open Source Tools , 2011 .

[8]  Jack Wiles,et al.  The Best Damn Cybercrime and Digital Forensics Book Period , 2007 .

[9]  Douglas Schweitzer Incident Response: Computer Forensics Toolkit , 2003 .

[10]  Rhonda Delmater,et al.  Data Mining Explained: A Manager's Guide to Customer-Centric Business Intelligence , 2001 .

[11]  Alan T. Sherman,et al.  UNDERSTANDING ISSUES IN CLOUD FORENSICS: TWO HYPOTHETICAL CASE STUDIES , 2011 .

[12]  Gregg H. Gunsch,et al.  An Examination of Digital Forensic Models , 2002, Int. J. Digit. EVid..

[13]  Terrence V. Lillard Digital Forensics for Network, Internet, and Cloud Computing: A Forensic Evidence Guide for Moving Targets and Data , 2010 .

[14]  Amy S. Jackson Book Review: Digital Forensics and Born-Digital Content in Cultural Heritage Collections , 2011 .

[15]  Karuppannan Jaishankar,et al.  Cyber Crime and the Victimization of Women: Laws, Rights and Regulations , 2012 .

[16]  Katharina Wagner,et al.  Digital Evidence And Computer Crime Forensic Science Computers And The Internet , 2016 .

[17]  I. Walden Computer crimes and digital investigations , 2007 .

[18]  Keith J. Jones,et al.  Real Digital Forensics: Computer Security and Incident Response , 2005 .

[19]  Albert Marcella,et al.  Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes , 2002 .

[20]  Warren G. Kruse,et al.  Computer Forensics: Incident Response Essentials , 2001 .

[21]  Bill Nelson,et al.  Guide to Computer Forensics and Investigations , 2003 .

[22]  Eoghan Casey,et al.  Digital Evidence and Computer Crime , 2000 .

[23]  Eric Mayer Scene Of The Cybercrime Computer Forensics Handbook , 2016 .