Professional Documents
Culture Documents
Secure Collection
Identification
Examination
Presentation
Application
Cyber Forensic Investigation Process:
• Identification
• Seizure / Acquisition
- Imaging
- Integrity verification
• Analysis
• Documentation
- Report preparation
Digital Evidence Collection
REQUIRES
SPECIAL TOOLS
FOR COLLECTION, DIGITAL EVIDENCE VOLATILE
EXTRACTION AND
PRESERVATION
FRAGILE
There are some special problems too:
“One of the Senior Service Manager working with the MNC received an email
message from one of this client who requested an immediate financial transaction
to send 1.25 Cr for vendor payment. In the received email, the client was
holding exactly his original email address. As the client who holds a prestigious
designation running several business organizations used to send frequent such
emails. Because of which, the official’s started the procedure to send the amount
to the concerned recipient wherein it was proved fatal. The situation became
worse when the client was found unknown who was asked to send the amount as
a vendor payment. After further analysis, it was clear that the suspect has carried
out the whaling attack, wherein they created the same email address so that the
examiners will be doubtless while investigating the case.”
Thank You !