Professional Documents
Culture Documents
Evidence Acquisition: D Musundire, MR (@taona2)
Evidence Acquisition: D Musundire, MR (@taona2)
D Musundire, Mr (@taona2)
2019
. . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . .
1 Admissible
2 Authentic : if you cant tie the evidence positively to the
incident, you cant use it to prove anything. Relevancy!!
3 Complete : Also known as exculpatory evidence
4 Reliable : collection and analysis procedures must not
cast doubt on the evidence’s authenticity and veracity
5 Believable : clearly understandable and believable to a
jury.
. . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . .
1 Admissible
2 Authentic : if you cant tie the evidence positively to the
incident, you cant use it to prove anything. Relevancy!!
3 Complete : Also known as exculpatory evidence
4 Reliable : collection and analysis procedures must not
cast doubt on the evidence’s authenticity and veracity
5 Believable : clearly understandable and believable to a
jury.
. . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . .
1 Admissible
2 Authentic : if you cant tie the evidence positively to the
incident, you cant use it to prove anything. Relevancy!!
3 Complete : Also known as exculpatory evidence
4 Reliable : collection and analysis procedures must not
cast doubt on the evidence’s authenticity and veracity
5 Believable : clearly understandable and believable to a
jury.
. . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . .
1 Admissible
2 Authentic : if you cant tie the evidence positively to the
incident, you cant use it to prove anything. Relevancy!!
3 Complete : Also known as exculpatory evidence
4 Reliable : collection and analysis procedures must not
cast doubt on the evidence’s authenticity and veracity
5 Believable : clearly understandable and believable to a
jury.
. . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . .
1 Admissible
2 Authentic : if you cant tie the evidence positively to the
incident, you cant use it to prove anything. Relevancy!!
3 Complete : Also known as exculpatory evidence
4 Reliable : collection and analysis procedures must not
cast doubt on the evidence’s authenticity and veracity
5 Believable : clearly understandable and believable to a
jury.
. . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . .
1 Registers, Cache
2 Routing Table, ARP Cache, Process Table, Kernel
Statistics, Memory
3 Temporary File Systems
4 Disk
5 Remote Logging and Monitoring Data that is Relevant to
the System in Question
6 Physical Configuration, Network Topology
7 Archival Media
. . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . .
Here we have items that are either not that vital in terms
of the data or are not at all volatile.
The physical configuration and network topology is
information that could help an investigation, but is likely
not going to have a tremendous impact.
Finally, archived data is usually going to be located on a
DVD or tape, so it isn’t going anywhere any-time soon.
It is great digital evidence to gather, but it is not volatile.
. . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . .