We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Survey of Digital Forensic Models and Proposed Thematic Scheme

by K. O. Peasah, Ebenezer Quayson, Osei Agyei, Ed. Danso Ansong
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 169 - Number 11
Year of Publication: 2017
Authors: K. O. Peasah, Ebenezer Quayson, Osei Agyei, Ed. Danso Ansong
10.5120/ijca2017914782

K. O. Peasah, Ebenezer Quayson, Osei Agyei, Ed. Danso Ansong . Survey of Digital Forensic Models and Proposed Thematic Scheme. International Journal of Computer Applications. 169, 11 ( Jul 2017), 41-45. DOI=10.5120/ijca2017914782

@article{ 10.5120/ijca2017914782,
author = { K. O. Peasah, Ebenezer Quayson, Osei Agyei, Ed. Danso Ansong },
title = { Survey of Digital Forensic Models and Proposed Thematic Scheme },
journal = { International Journal of Computer Applications },
issue_date = { Jul 2017 },
volume = { 169 },
number = { 11 },
month = { Jul },
year = { 2017 },
issn = { 0975-8887 },
pages = { 41-45 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume169/number11/28114-2017914782/ },
doi = { 10.5120/ijca2017914782 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:17:12.339712+05:30
%A K. O. Peasah
%A Ebenezer Quayson
%A Osei Agyei
%A Ed. Danso Ansong
%T Survey of Digital Forensic Models and Proposed Thematic Scheme
%J International Journal of Computer Applications
%@ 0975-8887
%V 169
%N 11
%P 41-45
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The internet and advanced technologies has been used as tools by criminals these days to perpetrate all forms of crime and the digital world is exploited to facilitate crimes which are mostly technology driven. The evidence of such crimes which are technologically driven are in digital form hence the need to employ techniques, procedures, and methodologies that are technology inclined to reconstruct events and uncover evidence that are admissible in court. Digital forensics therefore provides the investigative techniques, scientifically derived and proven methods for preserving, collecting, validating, identifying, analyzing, interpreting and presenting admissible digital evidence derived from digital source(s). Methods use to undertake forensic investigation is paramount since inappropriate model choice may result in incomplete or missing evidence. In this paper, we look at some commonly used models, their strength and weakness to inform investigators where to appropriately use those forensic investigation model(s) as well as a proposed scheme to aid the selection of the appropriate investigative model.

References
  1. Brian, C. and Eugene, H. S. (2003). Getting Physical with the Digital Investigation Process. International Journal of Digital Evidence, Fall 2003, Volume 2, Issue 2.
  2. Gary, L. P. (2001). A Road Map for Digital Forensic Research. Technical Report DTR – T0010-01, DFRWS. Report for the First Digital Forensic Science Communications, Vol. 2 No. 4
  3. Kruse II, W. and Jay, G. H. (2002). Computer Forensics: Incident Response Essentials. Addison – Wesley.
  4. Lee, H., Palmbach, T., Miller, M. (2001). Henry Lee’s Crime scene Handbook. London: Academic Press
  5. Marcus, K. R., James, G., Rick, M., Timothy, W. and Steve, D. (2006). Computer Forensics Field Triage Process Model. Journal of Digital Forensics, Security and Law, Vol. 1 No. 2
  6. Mark, R., Clint, C. and Gregg, G. (2002). An Examination of Digital Forensic Models. International Journal of Digital Evidence, Fall 2002, Volume 1, Issue 3.
  7. Michael, N., Mark, M. P. and Lawrence, P. (2000). Recovering and Examining Computer Forensic Evidence, Forensics Science Communications, Vol. 2, No. 4
  8. Technical Working Group Electronic Crime Scene Investigation – A Guide for First Responders, USDOJ, July 2001
  9. Venansius, B., and Florence, T. (2004). The Enhanced Investigation Process Model, in proceeding of Digital Forensic Research Workshop, Baltimore, MD.
  10. Yunus, Y., Roslan, I. and Zainuddin, H. (2011). Common Phases of Computer Forensics Investigative Models. International Journal of Computer Science & Information Technology (IJCSIT), Vol 3, No. 3.
Index Terms

Computer Science
Information Sciences

Keywords

Digital Forensic Models