Digital Forensic Analysis

Improved Essays
Windows registry is an excellent data source for digital forensic analysis because it is one of the quickest and most efficient uses of the forensic investigators time to decide whether a particular computer is of value to an investigation (especially in cases where multiple unknown computers are of interest). It can contain very rich data about an investigation without too much research and troubleshooting. The Windows registry two main task for the operating system; it stores all the setting for the applications and the operating system itself as well as is stores all the configuration of the hardware on the machine. A forensics investigator can characterize the valuable data from the Windows registry in five groups; system information, application information, network information, attached devices and history list (Alghafli, Jones, & Martin, 2014). The system information will relay all pertinent information about the computer speed, processor, user names, nick names, and shut down …show more content…
Network information will reveal all networks the computer was connected too including all intranets and wireless connections. The attached devices will reveal all USB, DVD/CD, media, etc. devices that have been connected to this computer also helping tie an unknown USB device to a particular computer. The history list will give an investigator all information about a user's latest activity including which files have been opened, modified, created, and websites visited. Windows registry stores data in binary code based on the application structure. Some applications can cause forensic analyst trouble as different applications can use different structures to store it and offenders can use this to help confuse investigators or to hide

Related Documents

  • Superior Essays

    Log files created by the web browser also store web browsing history information such as web pages visited and accessed along with dates and times of those visits (Ravi, 2007). The registry can provide evidentiary value to the digital forensic investigator as well in relation to web browser artifacts. Items such as passwords, default search provider and search engine, and the URLs typed into the web browser address bar are stored in the NTUSER.DAT file located within the NTUSER.DAT hive in the registry. Twenty five URLs can be stored at one time in the NTUSER.DAT file and they are cycled out as new URLs are typed into the web browser.…

    • 661 Words
    • 3 Pages
    Superior Essays
  • Improved Essays

    The advancement of forensic science has progressed immensely since its conception. The contributions it has made for the legal system are immense. One such example are its techniques used to extract DNA during forensic cases. DNA is considered to be one of the most well regarded and highly assessed sources of information (Gershaw et al., 2010). Another important development used during investigations is CODIS or the Combined DNA Index System.…

    • 1040 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    1. From what sources might the incident response team gather evidence? The incident response team should be alert to any electronic devices as they begin gathering evidence from different sources. For example, they see a gaming system.…

    • 196 Words
    • 1 Pages
    Decent Essays
  • Superior Essays

    The use of forensics in criminal investigations is to establish possible guilt or innocence of the potential suspect, linking crime between the suspect…

    • 1469 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    DEA Forensic Analysis

    • 525 Words
    • 3 Pages

    However, standard forensic techniques can help tremendously in solving cases no matter what obstacle an investigator may face. Some of the biggest challenges they faced was with the interference of crucial evidence. The FBI forensic team were not able to fully process some important samples that were taken from the Mexican police. MFJP did not let them process the evidence until the fall of the year 1985, through agreement between the U.S. and Mexican government (Saferstein, 2015).…

    • 525 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    a) Consent to Search In R v. Wills (1992) the court found the following criteria necessary for a valid consent search: 1. There was consent, expressed or implied; 2. The giver of the consent had the authority to give the consent; 3. The consent was voluntary (not police coerced); 4. The giver of consent was aware of the police conduct; 5.…

    • 1052 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    The fourth amendment protects all citizens from illegal searches and seizure of their possessions and property. The Weeks v. United States case law was established in 1914, which consisted of police entering Fremont Weeks home and illegally seizing evidence of Weeks transporting lottery tickets through the mail. This case is what brought forth the exclusionary rule, which makes any evidence obtained during an illegal search and seizure possibly inadmissible in court. To uphold the fourth amendment, officers need a probable cause to justify the search of someone’s home and other property. To establish probable cause, officers need factual evidence that leads them to believe that the suspect has committed a crime.…

    • 482 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Computer forensics is the preservation, acquisition, extraction, analysis, and interpretation of computer data. The ultimate goal of computer forensics is to identify, collect, preserve, and analyze the data that has been collected to use in a legal case. A lot of devices are capable of storing…

    • 824 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Evidence Interpretation

    • 1578 Words
    • 7 Pages

    Evidence Interpretation Over the years, there have been several cases that have been resolved with a false guilty plea or cases where a guilty party was not convicted of a crime. There are various elements that play a role in solving cases; evidence is a one of these key elements. Many factors can determine if the evidence submitted before a court of law is accurate such as how the evidence is collected, if proper protocell was followed before the laboratory’s handling of the evidence, and if the evidences was accurately processed by the crime scene laboratory by various forensic scientists. Furthermore, with the advances in technology in today’s society, various pieces of evidence such a DNA analysis have been considered a crucial element…

    • 1578 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    The Profiling Process

    • 863 Words
    • 4 Pages

    “You claim that you know who killed three people. And why? . . . All you mean is that you have a hunch.” “I will not quarrel with you over a word . . . Come now, Inspector.…

    • 863 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    “You claim that you know who killed three people. And why? . . . All you mean is that you have a hunch.” “I will not quarrel with you over a word . . . Come now, Inspector.…

    • 1662 Words
    • 7 Pages
    Superior Essays
  • Great Essays

    Ryan Smith12/12/17Forensics Final Project Part 1 Task 1) What is the nature of the alleged crime, and how does the nature of the crime influence a prospective investigation? The Nature of the alleged crime is unauthorized access to 3 photos that belong to Brendan Oliver. The photos were stolen and are being sold without Mr. Oliver’s consent. The nature of the crime influences a prospective investigation because the photos contained some sensitive nature.…

    • 711 Words
    • 3 Pages
    Great Essays
  • Improved Essays

    Technology has come a long way in enabling individuals with access to the world wide web, telephoning, email and so forth, but the advancements made in law enforcement go beyond these avenues. In the 1920’s and 30’s, crime reports were kept on index cards, filled away in cabinets because there were not any online data collecting abilities at the time. With the invention of computers and software programs, all of that data had to be collected and imputed for reference. Today, with just a click of the mouse, an officer can retrieve information that occurred in the 60’s or 70’s.…

    • 322 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Ones job choice is a very large and important decision one must make in there early adulthood. It is something they will do for a majority of their lives, as well as be ones income. When choosing a job it is important to look at many factors for it is not just something you can fall right into. Job qualifications can range from certain college degrees all the way to the hours required. Being in the criminal justice field, I have found that the career of a crime scene investigator (CSI) interests me.…

    • 1708 Words
    • 7 Pages
    Improved Essays
  • Great Essays

    As we have learned, there are many instances in which investigating authorities will collect information that not related to the case. “With the advent of computer forensic tools, it is also simple to search and locate specific data sets, such as emails, credit card numbers, passport numbers, telephone numbers, identity card numbers, photographs, videos etc.” (Law,…

    • 1554 Words
    • 7 Pages
    Great Essays