Forensic Investigation Methodology

The Computer Forensics and Investigation Methodology is a combination of 8 steps. Initially, the first 3 steps are to acquire some evidence about the system and the crime scene. Then, the followed 4 steps are repeatable and effective steps; and eventually is the final step which is writing the report. The figure below shows the Forensics Investigation Methodology; along with the PowerPoint file that explains each step:

Screen Shot 2017-03-08 at 10.40.47 am.png

The attached PowerPoint file explains the Forensic Methodology step-by-step:



Introduction to Digital Forensics – Part 2/2

There are several types of incident in which they might be discovered by implementing forensics techniques. Below are some examples of these incidents.

  • Malicious Code Attacks – For example, viruses, Trojan horse programs, worms and hacker scripts.
  • Unauthorised Access – For example, an improper logging into the users’ accounts; and unauthorised access to the files.
  • Unauthorised Utilisation of Services – For example, an intruder may also obtain access to information or plant Trojans and sniffers by misusing available services.
  • Disruption of Service – For example, disruption of network services, erase critical processes, spamming, Denial of Service (DoS).
  • Computer Misuse – For example, using the computer services of other than official purposes.
  • Espionage – For example, stealing information to subvert the interests of a company or government.
  • Hoaxes – For example, false information is spread about an incident or threat such as, the good times virus 1995 (Non-existent hoax).


There are many questions that we should ask ourselves such as, why do people do these incidents? what were stolen? and how did they do it? The answers for these questions are known as the Intellectual Property Theft. The statistics show that:

  • Why do people do these incidents?
    • Moved to competitor (70%).
    • Set-up competition (23%).
    • Other purposes (7%).
  • What were stolen?
    • Customer/client information (75%).
    • Financial info (14%).
    • Business Presentations (5%).
    • Other purposes (6%).
  • How did they do it?
    • E-mail (46%).
    • Hard copy (22%).
    • Electronic storage device (9%).
    • Other purposes (23%).


Therefore, the UK has now set up the National Crime Agency (NCA), which is new crime-fighting agency with national and international reach and the mandate and powers to work in partnership with other law enforcement organisations. This will bring the full weight of the law to bear in cutting serious and organised crime.

Computer Forensics

Computer forensics is the application of computer investigation and analysis techniques in the interests of determining potential legal evidence.

The forensic term can be used in many different areas in where they all agree with the forensic term (the theory behind the investigation and analysis), but they are differ in the final outcome. For example, Dentistry Forensic, Archaeology Forensic, Accounting Forensic, Graphology Forensic, Medicine Forensic, Digital Forensic, Network Forensic, Pathology Forensic, Psychology Forensic, Science Forensic, Toxicology Forensic and more. However, I will be focusing on the Digital and Network Forensics, where you can learn the forensic fundamental basis, forensic methodology, Windows forensic, iOS forensic, mobile phone forensic, network forensic; along with the ability to interact with LINUX System.


The question is “Who Does the Computer Forensic Analysis?

The answer that many people might think of or will come up with is the Police. However, that is not necessary correct nowadays, because more and more companies now realise that they need “in-houseForensics employees as first response to possible, intrusion and malicious intent.


Several facts about the Digital Forensic:

  1. Digital Forensic is not a proactive security, but a reactive scene to an event or request.
  2. Digital Forensic is not about finding the bad guys, but about finding evidences that might be very of valuable.
  3. Digital Forensic is not something you do for fun, but it requires some expertise.
  4. Digital Forensic is not something can be done quickly, but it takes some time to find any malicious activity.

Note: Multi TeraByte drives are becoming available. Thus, it is getting harder and becoming very difficult to find the result. Just imagine the time takes from you when you are looking for specific sheet between more than 5000 sheets. The PowerPoint file explains this in details (Digital Forensics):


In conclusion, Digital Forensic id not CSI (Crime Scene Investigation), but it is more likely to be gathering electronic evidences in the crime scene and analyse them to find any malicious or misuse activities.