Computer forensic as a form of trace evidence (e-evidence) or electronic evidence is an extremely delicate and often high-value form of evidence that tends to be unnoticeable to the human eye. Like in all other forms all the stages of the electronic evidence have to be carried out with outmost care. The slightest failure of adhering to the proper forensic regulations can affect the data’s integrity and destroy or weaken its evidence importance. With the current increase of electronic based evidence, the relevance of proper computer forensic techniques cannot be ignored therefore computer forensics remains as the only crucial discipline that can hold back the progress of these online criminals. This essay analyses the different aspects of computer forensics while mainly focusing on its role during data recovery.
Recovery
While initiating a computer forensic recovery process the opening step is gaining entrance to the main (original) media. Unlike other types of trace evidence, e-evidence is distinctive in that it can be copied exactly. Creating a duplicate, working copies or even bit-level master allows the forensic experts to thoroughly analyze media without fear of altering or damaging the original evidence. Before the duplicates can be made, the original has to be write–protected to ascertain that it cannot be changed by any later process.
The media target destination onto which the original has to be copied must also be validated, cleaned and pre-wiped to a known pattern to ascertain that it entails no additional information that was not in the original data. Outdated forms of memory, such as the (HDD) hard disk drive memory, are quite agreeable to this process, but newer forms of media storage like the mobile devices, which are increasingly growing popular, tend to deploy (SSD) solid state property and drive memory firmware that cannot current computer forensic technology cannot write-protect. The memory on such devices is therefore brittle and even applying power to turn on the target device can affect the data.
Upholding Data Honesty
Once the copy has been created and the original maintained, the two are then given an MD5 hush value a type of a digital fingerprint. This value is developed by running an algorithm through certain amount of data sector(s), file(s). The sum from this process is a unique, 128 bit identifier that cannot be copied or changed artificially. If there are no changes on the data set, its integrity is validated at any given time by application of the algorithm to the selected data to reproduce the original hash value. The hush value generation is therefore an important step in any forensic recovery, and is the only way to guarantee data authenticity.
Information Recovery
After the conservation and validation, then the actual recovery process starts. Effective data extraction needs analysis of files that are seen and those not seen. Deleted files are tagged as writeable, but the data within them is still there just overwritten by new information. Fragments of the removed or deleted data, even then still exist in what is known as the unallocated or slack space. The ability to reconstruct and gain usable information from these sectors depends mainly on the skill and experience of the forensic experts. This section of the practice however presents another problem between old and new forms such as SSD. Recovering deleted or hidden information from SSD drive is extremely hard; however, the ever-increasing worth of these mediums to litigations and investigations means they cannot be sidelined. The experts are left with no alternative than to salvage what they can while, changing data as little as possible.
Safekeeping
These procedures need media to move locations and change hands, method commonly known as the custody chain. From the moment media is recovered to the end of its use and everything in between, entity, or individual that takes possession of the data must be documented. Chain of custody forms entail there to be time and date of evidence collection, location, and evidence details, such as model, machine serial number and hard drive. This is important since everyone within the chain is considered a possible witness. Lastly, the data should be stored in bags that are tamper proof.
Defensibility
In the end the whole process is only as good as its defense in court, and the most defensible processes are both identifiable and repetitive. Adhering to familiar methods means always guaranteeing sticking to forensic best practices and repeatability which needs careful documentation of every procedure from point of contact to extraction. Individuals note taking and photographs are the best tools for ensuring justification. These types of tools directly help refresh the investigators memory; they also help accurately relate the process while testifying.
Conclusion
In real-life investigations the computer forensic processes are extremely essential. They all help guarantee proper validation, recovery, custody, access and defensibility within the court processes, that all need the expertise and skills of professionals. As the nature of evidence is increasingly becoming electronic forensic investigation develops even more, therefore parties cannot afford to take chances but rely on the best for computer forensic investigations.