17.10.2014 Views

Crosby-Signed Thesis - Alliance Digital Repository

Crosby-Signed Thesis - Alliance Digital Repository

Crosby-Signed Thesis - Alliance Digital Repository

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

IMPACT OF IPV6 TRANSITION MECHANISMS ON THE NETWORK FORENSIC<br />

9<br />

7. Search for evidence.<br />

8. Collect the evidence.<br />

9. Preserve, transport, copy, and store the evidence for analysis.<br />

10. Examine and verify the integrity and validity of the evidence in relation to the<br />

identified events and internal data relationships.<br />

11. Classify and separate the evidence into individual components.<br />

12. Prioritize the evidence by identifying the most compelling components.<br />

13. Reconstruct the events and link the physical data to the milestones in the event<br />

history.<br />

14. Consult experts and other specialists when necessary.<br />

15. Analyze and document the conclusions.<br />

16. Verify the availability of resources to advance the investigation or case.<br />

17. Verify if the schedule and event history is feasible given the facts of the case.<br />

18. Decide whether to move forward, look for more evidence, or drop the case.<br />

19. Profile and summon suspects.<br />

20. Present the evidence and case to the prosecutor and court.<br />

21. Prove the case and challenge any presented defenses.<br />

22. Return the evidence to the owner and restore affected systems to their previous states.<br />

23. Disseminate the knowledge and improve criminal profiles to aid in future cases.<br />

Table 1 illustrates which of the ten frameworks presented in the document explicitly contain<br />

elements of the twenty-three common processes.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!