Editing Workflow:Archival Forensics workflow (storage media deposit)

Jump to navigation Jump to search

Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.

The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then save the changes below to finish undoing the edit.

Latest revision Your text
Line 29: Line 29:
  
 
; IMAGING
 
; IMAGING
: Create an exact copy of storage media, encapsulating contents and structures in a single file (a disk image).  
+
: Create an exact copy of storage media, encapuslating contents and structures in a single file (a disk image).  
 
# Use write-blocking tools (software or hardware) to only permit read-only access to storage media, so as to avoid compromising the integrity of the data; and protect the data chain of custody.
 
# Use write-blocking tools (software or hardware) to only permit read-only access to storage media, so as to avoid compromising the integrity of the data; and protect the data chain of custody.
 
# Use disk imaging software to generate a forensic image file, which can either be:  
 
# Use disk imaging software to generate a forensic image file, which can either be:  
Line 36: Line 36:
 
#* A selection of specific files and directories, also known as a targeted collection.
 
#* A selection of specific files and directories, also known as a targeted collection.
 
# Instruct the disk imaging software to create a complete file and directory listing; and verify the integrity of the generated image file by comparing hashes:
 
# Instruct the disk imaging software to create a complete file and directory listing; and verify the integrity of the generated image file by comparing hashes:
#* If verification fails and attempts at re-imaging are unsuccessful, create a "failed imaging" report in the Collections Management System logs.
+
#* If verification fails and attempts at re-imaging are unsuccessful, create a "failed imaging" report in the COllections Management System logs.
 
#* If verification is successful, store the image in process store.
 
#* If verification is successful, store the image in process store.
 
# Is further forensic processing and analysis required?
 
# Is further forensic processing and analysis required?
Line 47: Line 47:
 
# Perform virus and malware detection checks on the collated sources.
 
# Perform virus and malware detection checks on the collated sources.
 
# Use forensic software to identify and, if possible, remove irrelevant or redundant files from processing. Examples may include operating systems, system files, or user-defined files that have been deemed as irrelevant.
 
# Use forensic software to identify and, if possible, remove irrelevant or redundant files from processing. Examples may include operating systems, system files, or user-defined files that have been deemed as irrelevant.
# Use forensic software to process the data, including hash generation for files; expanding compound files (e.g. zip archives); format identification and validation; creating search text indices; and preparing audiovisual, web and email data for analysis.
+
# Use forensic software to process the data, including hash generation for files; expanding compound files (e.g. zip archives); format identification and validation; creating search text indices; and preparing audiovisual, web amnd email data for analysis.
 
# Proceed to Analysis.
 
# Proceed to Analysis.
 
 
Line 55: Line 55:
 
# Depending on the nature of the data and on archival needs, use forensic software to identify records of interest, and make them available for appraisal. Analysis methods may include:
 
# Depending on the nature of the data and on archival needs, use forensic software to identify records of interest, and make them available for appraisal. Analysis methods may include:
 
#* Data carving, for restoring data that was deleted or lost from the file system.
 
#* Data carving, for restoring data that was deleted or lost from the file system.
#* Decrypting encrypted files and recovering passwords for password-protected files.
+
#* Decrypting encrypted files and recovering passwords for passwrd-protected files.
 
#* Viewing and exporting geolocation data from files that have geolocation information associated with them.
 
#* Viewing and exporting geolocation data from files that have geolocation information associated with them.
 
#* Analysing document content to explore terms/words of interest; and automate the identification of personal information, such as names, phone numbers, credit card and social security numbers.
 
#* Analysing document content to explore terms/words of interest; and automate the identification of personal information, such as names, phone numbers, credit card and social security numbers.
#* Identifying the language in which documents are written.
+
#* Identifying the langauge in which documents are written.
 
#* Generating thumbnails from images and videos; and extracting metadata from multimedia files.
 
#* Generating thumbnails from images and videos; and extracting metadata from multimedia files.
 
#* Flagging duplicate files.
 
#* Flagging duplicate files.
#* Discovering information (including documents and email communications) relating to pre-defined lists of persons of interest.
+
#* Discovering infomation (incluidng documents and email communications) relating to pre-defined lists of persons of interest.
 
# Once all analyses have been completed, consolidate the resulting data into an appropriate file/folder structure.  
 
# Once all analyses have been completed, consolidate the resulting data into an appropriate file/folder structure.  
 
# Proceed to Exporting.
 
# Proceed to Exporting.
  
; EXPORTING
+
; Exporting
 
: Export the forensically analysed contents of storage media as logical disk images, alongside relevant processing reports, filters and labels.
 
: Export the forensically analysed contents of storage media as logical disk images, alongside relevant processing reports, filters and labels.
# Export any custom filters and labels created to manage the data, which can be useful for other digital archiving processes. Filters help locate items of interest quickly; and labels allow for grouping files in customised ways (e.g. flagging content that requires archivist attention; or records associated with a specific individual).
+
# Export any custom filters and labels created to manage the data, which can be useful for other digital archiving processes. Filters help locate items of interest quickly; and labels allow for grouping files in customised ways (e.g. flagging content that requires arhivist attention; or records associated with a specific individual).
 
# Export any reports generated during processing and analysis, such as file hashes, virus and malware detection reports, search index terms and geolocation data.
 
# Export any reports generated during processing and analysis, such as file hashes, virus and malware detection reports, search index terms and geolocation data.
 
# Export the forensically curated contents of processed storage media into a logical disk image.
 
# Export the forensically curated contents of processed storage media into a logical disk image.

Please note that all contributions to COPTR are considered to be released under the Attribution-ShareAlike 3.0 Unported (see COPTR:Copyrights for details). If you do not want your writing to be edited mercilessly and redistributed at will, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource. Do not submit copyrighted work without permission!

To edit this page, please answer the question that appears below (more info):

Cancel Editing help (opens in new window)

Template used on this page: