< All Computer Hacking and Forensics Notes

reyneral | Computer and Hacking Forensics | Module 1 - Modern Forensics

By: reyneral | Related Course: Computer Hacking and Forensics | Published: April 3, 2018 | Modified: April 3, 2018
Join Cybrary

Notepadmodern forensics note

Types of attack :

External and Internal Attack


Study of forensics is using any source of physical sciences to find the truth.


Ultimately we want to preserve evidence until we can do something about it. -> Avoid contamination. 



1. Identify

-. a crime happens, then someone  need to identify the crime scene

2. Preserve (chain of custody is required)

-. warrant or consent for the evidence. First responder is required to evaluate the evidence. Seize the evidence to be analyzed.

3. Extraction (take it from crime scene to the lab to analyze it)

-. transport the evidence, make a clone, prove that the clone has an integrity (is not tempered in unauthorized manner using MD5/SHA). Chain of custody. Store the evidence.

4. Interpretation (prosecution and defense)

-. analyze

5. Documentation (recording)

-. report

6. Presentation 

-. take it to the court


Evidence needs to be :

Whole (complete)

Admissible (has to be able to be taken to court)

Accurate (relevant to the case)

Authentic (original evidence)

Acceptable (able to prove or disprove a fact)


Types of crime:

click jacking, extortion, investment fraud, software or copyright piracy, D0S, Auction fraud, Email spam, Identity theft, virus and worm, malware, cyber stalking/bullying, financial fraud, child porn, embezzlement, phishing, farming, whaling, spear phishing.


< All Computer Hacking and Forensics Notes
Join Cybrary

Our Revolution

We believe Cyber Security training should accessible for everyone, everywhere. Everyone deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is the world's largest community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

We recommend always using caution when following any link

Are you sure you want to continue?