Digital forensics - Computer Science
Digital forensics is often summarized in four phases (e.g., collection, preservation, analysis, and reporting). We have learned this already.
However, I think its important for you to be aware of how there are many different excellent models out there that seek to break down digital forensics in a series of flowcharts/phases / moving parts. Then Chapter 14 talks about the different trends and future directions.
So, I am attaching a couple research papers. Please check out them out in which can be found in the Supplemental Materials folder.
Some of the models out there are very specific e.g., for network forensics, triage, or cybercrime.
I would like you to read these papers - who knows you may see a model that resonates well with you. This can be helpful if you are asked to consult on what is the right model that should be followed in a particular legal matter in today’s brave new world.
Instructions
Now that you have reviewed the different models of digital forensics, what are your thoughts about the authors proposed model? Do you agree or disagree? Do you have a preference for the other models and if so, what is your preference and why? Note - there are NO right or wrong answers here. I value your insights.
APA Format
Need 1 Page without references page
Plagiarism report
!!! RESEARCH DOCUMENTS ATTACHED !!!!
!!! NEED 2 ANSWERS FOR THIS QUESTION WITH 0\% PLAGIARISM!!!!
See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/242524844
FORENSIC COMPUTING MODELS: TECHNICAL OVERVIEW
Conference Paper · November 2012
DOI: 10.5121/csit.2012.2222
CITATIONS
19
READS
862
3 authors, including:
Some of the authors of this publication are also working on these related projects:
Edited Book View project
Patent View project
Gulshan Shrivastava
Sharda University
95 PUBLICATIONS 507 CITATIONS
SEE PROFILE
Kavita Sharma
G.L. Bajaj Institute of Technology & Management
58 PUBLICATIONS 412 CITATIONS
SEE PROFILE
All content following this page was uploaded by Gulshan Shrivastava on 04 April 2018.
The user has requested enhancement of the downloaded file.
https://www.researchgate.net/publication/242524844_FORENSIC_COMPUTING_MODELS_TECHNICAL_OVERVIEW?enrichId=rgreq-c9b81550f21377b21b9aa9dca126b85c-XXX&enrichSource=Y292ZXJQYWdlOzI0MjUyNDg0NDtBUzo2MTE3NTE2MzI1ODA2MDhAMTUyMjg2NDM2MzA1OQ\%3D\%3D&el=1_x_2&_esc=publicationCoverPdf
https://www.researchgate.net/publication/242524844_FORENSIC_COMPUTING_MODELS_TECHNICAL_OVERVIEW?enrichId=rgreq-c9b81550f21377b21b9aa9dca126b85c-XXX&enrichSource=Y292ZXJQYWdlOzI0MjUyNDg0NDtBUzo2MTE3NTE2MzI1ODA2MDhAMTUyMjg2NDM2MzA1OQ\%3D\%3D&el=1_x_3&_esc=publicationCoverPdf
https://www.researchgate.net/project/Edited-Book-6?enrichId=rgreq-c9b81550f21377b21b9aa9dca126b85c-XXX&enrichSource=Y292ZXJQYWdlOzI0MjUyNDg0NDtBUzo2MTE3NTE2MzI1ODA2MDhAMTUyMjg2NDM2MzA1OQ\%3D\%3D&el=1_x_9&_esc=publicationCoverPdf
https://www.researchgate.net/project/Patent-56?enrichId=rgreq-c9b81550f21377b21b9aa9dca126b85c-XXX&enrichSource=Y292ZXJQYWdlOzI0MjUyNDg0NDtBUzo2MTE3NTE2MzI1ODA2MDhAMTUyMjg2NDM2MzA1OQ\%3D\%3D&el=1_x_9&_esc=publicationCoverPdf
https://www.researchgate.net/?enrichId=rgreq-c9b81550f21377b21b9aa9dca126b85c-XXX&enrichSource=Y292ZXJQYWdlOzI0MjUyNDg0NDtBUzo2MTE3NTE2MzI1ODA2MDhAMTUyMjg2NDM2MzA1OQ\%3D\%3D&el=1_x_1&_esc=publicationCoverPdf
https://www.researchgate.net/profile/Gulshan-Shrivastava?enrichId=rgreq-c9b81550f21377b21b9aa9dca126b85c-XXX&enrichSource=Y292ZXJQYWdlOzI0MjUyNDg0NDtBUzo2MTE3NTE2MzI1ODA2MDhAMTUyMjg2NDM2MzA1OQ\%3D\%3D&el=1_x_4&_esc=publicationCoverPdf
https://www.researchgate.net/profile/Gulshan-Shrivastava?enrichId=rgreq-c9b81550f21377b21b9aa9dca126b85c-XXX&enrichSource=Y292ZXJQYWdlOzI0MjUyNDg0NDtBUzo2MTE3NTE2MzI1ODA2MDhAMTUyMjg2NDM2MzA1OQ\%3D\%3D&el=1_x_5&_esc=publicationCoverPdf
https://www.researchgate.net/institution/Sharda_University?enrichId=rgreq-c9b81550f21377b21b9aa9dca126b85c-XXX&enrichSource=Y292ZXJQYWdlOzI0MjUyNDg0NDtBUzo2MTE3NTE2MzI1ODA2MDhAMTUyMjg2NDM2MzA1OQ\%3D\%3D&el=1_x_6&_esc=publicationCoverPdf
https://www.researchgate.net/profile/Gulshan-Shrivastava?enrichId=rgreq-c9b81550f21377b21b9aa9dca126b85c-XXX&enrichSource=Y292ZXJQYWdlOzI0MjUyNDg0NDtBUzo2MTE3NTE2MzI1ODA2MDhAMTUyMjg2NDM2MzA1OQ\%3D\%3D&el=1_x_7&_esc=publicationCoverPdf
https://www.researchgate.net/profile/Kavita-Sharma-4?enrichId=rgreq-c9b81550f21377b21b9aa9dca126b85c-XXX&enrichSource=Y292ZXJQYWdlOzI0MjUyNDg0NDtBUzo2MTE3NTE2MzI1ODA2MDhAMTUyMjg2NDM2MzA1OQ\%3D\%3D&el=1_x_4&_esc=publicationCoverPdf
https://www.researchgate.net/profile/Kavita-Sharma-4?enrichId=rgreq-c9b81550f21377b21b9aa9dca126b85c-XXX&enrichSource=Y292ZXJQYWdlOzI0MjUyNDg0NDtBUzo2MTE3NTE2MzI1ODA2MDhAMTUyMjg2NDM2MzA1OQ\%3D\%3D&el=1_x_5&_esc=publicationCoverPdf
https://www.researchgate.net/profile/Kavita-Sharma-4?enrichId=rgreq-c9b81550f21377b21b9aa9dca126b85c-XXX&enrichSource=Y292ZXJQYWdlOzI0MjUyNDg0NDtBUzo2MTE3NTE2MzI1ODA2MDhAMTUyMjg2NDM2MzA1OQ\%3D\%3D&el=1_x_7&_esc=publicationCoverPdf
https://www.researchgate.net/profile/Gulshan-Shrivastava?enrichId=rgreq-c9b81550f21377b21b9aa9dca126b85c-XXX&enrichSource=Y292ZXJQYWdlOzI0MjUyNDg0NDtBUzo2MTE3NTE2MzI1ODA2MDhAMTUyMjg2NDM2MzA1OQ\%3D\%3D&el=1_x_10&_esc=publicationCoverPdf
David C. Wyld, et al. (Eds): CCSEA, SEA, CLOUD, DKMP, CS & IT 05, pp. 207–216, 2012.
© CS & IT-CSCP 2012 DOI : 10.5121/csit.2012.2222
FORENSIC COMPUTING MODELS:
TECHNICAL OVERVIEW
Gulshan Shrivastava, Kavita Sharma, Akansha Dwivedi
Department of Information Technology,
Dronacharya College of Engineering, Gr. Noida, U.P., India
[email protected],
[email protected],
[email protected]
ABSTRACT
In this paper, we deal with introducing a technique of digital forensics for reconstruction of
events or evidences after the commitment of a crime through any of the digital devices. It shows
a clear transparency between Computer Forensics and Digital Forensics and gives a brief
description about the classification of Digital Forensics. It has also been described that how
the emergences of various digital forensic models help digital forensic practitioners and
examiners in doing digital forensics. Further, discussed Merits and Demerits of the required
models and review of every major model.
KEYWORDS
Digital Forensics, Computer Forensics, Digital Forensic Model, Digital Forensic History,
Digital Evidence.
1. INTRODUCTION
Today in the computers world along with the computers, its user is also increasing very rapidly.
Now the time has come in which organization are strongly dependent on the computers and
internet for taking their business to the crest. A large package of information is being sent or
received at one click. The large numbers of computers are connected in a cob-web like network,
which is necessary for dispatching and receiving information. Along with boom, these computers
are also responsible for cyber frauds and cybercrimes (CFCC).the first computer crime was
approximately 85\% of 66 million U.S dollar was last by organizations due to digital related crime
in 2007.The technique named “Digital Forensics” has been started from a basic level and
extended up to level, that it has occupied an untouched and influence able place in almost every
field related to the computers. Its birth is stated in 1970’s almost forty years back. In the initiating
days of digital forensics it was primarily used for data recovery and the technique was only
performed by the computer professionals. This research emphasizes on a techniques through
which the clues after crime can be constructed i.e. a uniform approach of digital forensic models
208 Computer Science & Information Technology (CS & IT)
for digital forensic investigation. The research is about the postulates of the different digital
forensic models and their limitation. The research will conclude to a new digital forensic model.
1.1 History and Previous Work
Mark Reith et al. concluded that “digital forensic is the use of scientifically derived and proven
methods toward the identification, preservation, collection, validation, analysis, interpretation,
documentation and presentation of digital evidence derived from digital sources for the
reconstruction of events”. Digital forensics is a wide branch comprising of branch like computer
forensics, digital forensics not only cover the evidences reconstructed after the crime committed
by or through a stand-alone computers , the evidences reconstructed from any of digital sources
can be interpreted by using digital forensics. Digital forensics investigation has three phases to go
through.
Table 1 :( History Evolution of digital forensic) [2]
Year History
1978
First computer crime in Florida which involved unauthorized modification and
deletion of data on a computer system.
Prior 1980
Computer crimes were solved using existing laws. No federal laws for computer
crimes.
1983 Canada – The first country to pass legislation dealing with computer crimes.
1984 United States passed Federal Computer Fraud & Abuse Act
1990 United Kingdom passed British Computer Misuse Act.
1992
Collier & Spaul wrote a paper ‘A forensic methodology for countering computer
crime.’
2002
Scientific Working Group on Digital Evidence (SWGDE) produced a paper ‘Best
practices for computer forensic’.
2005
Publication of an ISO standard (ISO 17025, General requirements) for the
competence of testing & calibration laboratories.
2005
Onwards
till now
Various dimensions related to computer crimes are being discussed.
Computer Science & Information Technology (CS & IT) 209
1.2 Process of Digital Forensic Investigation
Figure 1 :( Process of Digital Forensic) [1]
1.2.1 Acquiring
It is the process of conquering the digital evidences carefully, so the integrity of evidence can be
maintained.
1.2.2 Authenticating
The process of examining the validation of evidence, whether it is valid to use or not.
1.2.3 Analyzing
The close examination of data to sort out the case.
2. DIGITAL EVIDENCES AND IT’S CHARACTERISTICS
Digital evidence is defined as the clues which can be recovered from digital sources and
helps in digital forensic investigation. Digital evidence is very delicate to deal with. If it is handed
improperly, its integrity can be spoiled. Digital evidence is hidden evidence just like any
biometric evidence [3].
2.1 Classification of Digital Forensics
It is stated that there are various types of digital forensics. Some of them are:-
ACQUIRING
AUTHENTICATING
ANALYZING
210 Computer Science & Information Technology (CS & IT)
Figure 2 :( Types of Digital Forensics)
i. Computer Forensics
It has been defined that this branch of digital forensics deals with the reconstruction of evidences
from the suspected computer which is found from the location of crime. It has also been called as
‘media forensics.
ii. Software Forensics
It has been called as ‘code analysis. In this branch it has been discussed about the identification of
the developer of unauthorized code, or of any e-mail document.
iii. Cyber Forensics
It is also called as ‘network forensics. This technique is used to identify, collect, examine the
digital evidences reconstructed from various digital sources or to measure the amount of
unauthorized activities meant to disrupt, corrupt the particular system.
iv. Document Digitized Forensics
It is being considered as upcoming branch of digital forensics to develop the procedures for
detecting the decepted data and its solution. Usually frauds committed through printers and
scanners will be resolved by this technique.
3. NEED OF DIGITAL FORENSIC MODEL
To reconstruct the digital evidences from digital sources a technique called digital forensics has
been developed. The digital forensic models have been constructed so that step wise or ordered
inspection procedure of digital evidences can be made through it. The models can provide digital
evidence examiners or investigators with the detailed and transparent information’s about
particular aspect or phase to be considered during the process of digital forensic investigation.
Computer Science & Information Technology (CS & IT) 211
4. EXISTING DIGITAL FORENSIC INVESTIGATION MODEL
Table 2 :( Existing digital forensics models)
4.1 The Forensic Process Model [4]
This model was proposed by NIJ for electronic crime scene investigation. It comprises of four
phases:
1. COLLECTION: in this process evidences are searches, felicitated and get collected.
2. EXAMINATION: it is done to make the evidences transparent & find the base of its origin.
3. ANALYSIS: the inspection of the outcome of the examination phase.
4. REPORTING: outlining the outcomes and conclusion of all the phases and information gathered.
Disadvantage: The analysis phase of this model is improperly defined and ambiguous [9].
Year Model Description
2001
The forensic process model proposed
by Ashcroft the U.S National
Institute of Justice(NIJ)
It serves as a guide for first responders.
This guide is used by enforcement &
other for protecting , recognition , can
of digital evidence
2002
Abstract digital forensic model
proposed by Reith , Carr & Gunsch
It is based on traditional strategy of
forensic evidence collection.
2003
The integrated digital investigation
process model (IDIP) proposed by
Carrier and Spafford.
In this model digital investigative
process is converted into physical
investigation process.
2004
Extended model of cyber crime
investigation proposed by
Ciardhuain
It emphasizes on the management
aspect.
2005
Case-relevance information
investigation proposed by Ruibin,
Yun & Gartner.
In this model computer intelligence will
assist in investigation procedures. The
degrees of case-relevance are defined.
2009
Digital forensic model based on
Malaysian investigation process
proposed by Perusal
The acquiring of static & dynamic data
is included in this model.
2011
The systematic digital forensic
investigation model (SRDHM)
proposed by Ademu, Imafidon and
Preston.
It helps forensic examiner &
organization in a proper manner.
212 Computer Science & Information Technology (CS & IT)
Figure 3 : ( Forensic Process Model)
Figure 4 : ( Disadvantage in Forensic Process Model)
Collect
The Evidence
Examine the
evidence
Analyze the
evidence
Reporting
Improperly defined
and ambiguous
process. It is often
misunderstood as an
interpretation of the
results from
examination phase
COLLECTION
EXAMINATION
ANALYSIS
REPORTING
Computer Science & Information Technology (CS & IT) 213
4.2 The Abstract Digital Forensic Model [5]
This model comprises of nine components.
1. IDENTIFICATION: It helps in recognizing & identifying the type of the incident. It has a
influence on other steps or phases of this model.
2. PREPARATION: The preparation of procedure, techniques, search warrants.
3. APPROACH STRATEGY: It is the formulation of procedures and approach to be used in the
collection of evidences.
4. PRESERVATION: It deals with securing and preserving the evidences.
5. COLLECTION: The collection is done using the standardized procedures to record the
physical scene.
6. EXAMINATION: It deals with searching evidences of the related suspect of the crime.
7. ANALYSIS: The inspection of importance of examined product.
8. PRESENTATION: The explanation of all the phases involved.
9. RETURNING EVIDENCE: Returning the digital sources back to the right owner.
Disadvantage: In this model third phase is to an extent a duplication of its second phase. This is
because the preparation wile selecting tools directly depends on strategy selected.
Figure 5 : ( Disadvantage of the Abstract Digital Forensic Model)
Returning
Evidence
Identification Preparation Approach
Strategy
Preservation
Collection
Examination Analysis Presentation
Duplication of each other
214 Computer Science & Information Technology (CS & IT)
4.3 The Integrated Digital Investigation Model (2003) [3]
The previous work has been reviewed and digital investigation process is transformed into the
physical investigation process. Brian Carrier and Eugene Spafford proposed model that manages
the process into five groups.
1. READINESS PHASES: The goal of this phase is to ensure that the operations and
infrastructure are able to fully support an investigation.
2. DEPLOYMENT PHASE: The motive of this phase is to provide a mechanism for an
incident to be detected and confirmed.
3. PHYSICAL CRIME SCENE INVESTIGATION PHASE: The goal of this phase is to collect
and analyze the physical evidence and reconstruct the actions that took place during the incident.
4. DIGITAL CRIME SCENE INVESTIGATION PHASE: The goal is to collect and analyze the
digital evidence that was obtained from the physical investigation phase and through any other
future means. It includes same process as physical evidence phase; however the main focus is to
collect digital evidence.
5. REVIEW PHASE: This includes a review of the whole investigation and identifies areas of
improvement.
Disadvantage: The deployment phase of this model deals with the confirmation of the incidents.
But in practice it is impossible to confirm the digital or computer crime before proper
investigation.
4.4 Extended Model Of Cyber Crime Investigation (2004)[6]
It was stated that the previous models were concentrated only to the processing of cyber crime
evidences in cyber crime investigation. This model emphasizes on the management aspect of
digital evidences.
4.5 Case – Relevance Information Investigation(2004)[7]
The requirement of computer intelligence technology has been explained in this model it emerges
as an assistant to the investigation procedures it is used to describe the degrees of case-
applicability and to distinguish between the forensics and the computer security.
4.6 Digital Forensic Model Based On Malaysian Investigation Process (2009)[8]
It was proposed by Perusal in 2009. It is defined that this model has been proved as an important
phase to acquire static and dynamic data. This model emphasis more on delicate digital evidence.
4.7 The Systematic Digital Forensic Investigation Model (2011)[1]
This was proposed by Ademu, Imafidon and Preston. This model helps the forensics practitioners,
examiners to set accurate procedures techniques in a proper manner.
Computer Science & Information Technology (CS & IT) 215
5. CONCLUSIONS
In order to be revealed or accepted in the court, digital evidences must be precise and accurate
and its integrity should not be spoiled by heedlessness. The process of digital forensics is to aid
the digital forensic investigation and practitioners in reconstructing the evidences the association
of digital forensics needs to form a guide line for the swift development of digital forensic
procedure so that evidences can be easily elucidated, examined and processed.
ACKNOWLEDGEMENTS
We are grateful to Prof. M.P.S. Bhatia (Dean of Student Welfare, Netaji Subhas Institute of
Technology), Dr. Vishal Bhatnagar (Associate Professor, Ambedkar Institute of Communication
Technologies and Research), & Mr. Parbal Partab (Scientist, DRDO) for taking time to read
carefully drafts of this paper and provide us with valuable comments.
The authors are also grateful for thoughtful comments from reviewers who improved the content
of the paper. The authors would like to thank everyone, just everyone!
REFERENCES
[1] Inikpi O.Ademu, Dr. Chris.O.Imafidon, Dr.David S. Preston (2011)“A new approach of digital
forensic model for digital forensic investigation” vol 2, no. 12, 2011.
[2] Kruse II, Warren and Jay, G. Heiser (2002) Computer Forensics: Incident Response
Essentials.Addison-Wesley.
[3] Carrier, B.Spafford, H.(2006),getting physical with digital forensics process vol. 2(2)available online:
http://www.cerias.purdue.Edu/ homes/carrier/forensics accessed on 20
th
September 2011.
[4] National institute of Justice.(July 2001) Electronic Crime Scene Investigation A guide for first
responders http://www.ncjrs.org/pdffiles1/nij/187736.pdf.
[5] Reith, M.Carr.c.Gunsch, G. (2002) an examination of digital forensic model. Department of electrical
and computer engineering Air force institute of technology.Wright-Patterson.available (online):
http://www.utica.edu/academic/institutes/escii/ijde/articles.cfm?action accessed on the 7
th
October
2011.
[6] Ciardhuain, S.(2004) an extended model of cyber-crime investigation Accessed on 20
th
October 2011
available (online): www.ijde.org/citeseerx.ist.psu.edu/view doc/download? doi=10.1.180......Accessed
on 11th august 2011
[7] Ruibin, G.Gaertner, M.(2005)case-relevance information investigation process : binding computer
intelligence to the current computer forensics frame work. Vol. 4(1) available (on line):
http://www.utica.edu/academic/institutes/ecii/publications/article/B4A6A102-A93D-
85B195C575D5E35F3764.pdf Accessed 15
th
September 2011.
[8] Perumal,S.(2009) digital forensics model based on Malaysian investigation process vol. 9(8) available
(on line): http://paper.ijcsns.org/o7_book/200908/20080805 pdf Accessed on 7th august 2011.
216 Computer Science & Information Technology (CS & IT)
[9] Baryamureeba, V.Tushabe, F. (2004) The Enhanced digital investigation process (2004) Available
(online):http//www.dfrws.org/2004/bios/day1/tushabeEIDIP.pdf Accessed on 15
th
June 2011.
Authors
Gulshan Shrivastava, working as Assistant Professor in Dronacharya College of
Engineering, Greater Noida (U.P.). He has obtained a degree of M.Tech. (Information
Security) from Ambedkar Institute of Communication Technology and Research, New
Delhi and MBA (IT) from Punjab Technical University, Jalandhar, Punjab after
completing B.E. (Computer Science Engineering) from Hindu College of Engineering,
Sonipat, Haryana. He has rich experience in teaching the classes of Graduate and Post-
Graduate in India and Abroad. He is a Sun Certified Java Programmer (SCJP 5.0). He
has been continuously imparting corporate training to the experienced professionals of multinational IT
giants in the area of Java Programming & Information Security. He has participated in many National &
International Workshop and Technical Fest. He has contributed to numerous International journal &
conference publications in various areas of Computer Science. He published more than 10 Research Paper
in International Journals and Conferences. He has also written an International book Titled as “Java
Programming & Website Design” (ISBN 81-87201-25-8), which is published by Suhavi Publication, India.
He is also holding position in editor team of various International Journals and magazines of high repute.
He is member of The Society of Digital Information and Wireless Communications (SDIWC), Internet
Society, Institute of Nanotechnology, Life Member, International Association of Engineers (IAENG), Life
Member, International Association of Computer Science and Information Technology (IACSIT), Computer
Science Teachers Association (CSTA), International Association of Online Engineering (IAOE). His area
of interest includes Java Programming, Website Designing, Data Mining, Information Security and
Forensic Investigation.
Kavita Sharma, working as Assistant Professor in Dronacharya College of
Engineering, Greater Noida (U.P.). She received the M.Tech. (Information Security)
from Ambedkar Institute of Technology, New Delhi, India, Affiliated by G.G.S.
Indraprastha University after completed her B.Tech. Degree in Information
Technology from the I.M.S. Engineering College, Ghaziabad, India. She has
published more than 9 research papers in International Journals and Conferences of
high repute. She has also written an International book ISBN as “81-87201-25-8”,
which is published by Suhavi Publication, India. She is also holding position in editorial team of various
International Journals and magazines of high repute. She is member of The Society of Digital Information
and Wireless Communications (SDIWC), Internet Society, Life Member, International Association of
Engineers (IAENG), Life Member, International Association of Computer Science and Information
Technology (IACSIT), Computer Science Teachers Association (CSTA), International Association of
Online Engineering (IAOE). She has actively participated in different faculty development programs. She
has participated in different National & International Workshop. Her area of interest includes Digital
Forensic Investigation, Data Structure and Algorithm, Web Mining, Programming Language, Cryptography
and Data Security.
Akansha Dwivedi, pursuing Bachelor of Technology Degree in Information
Technology from Dronacharya College of Engineering, Greater Noida, U.P. India,
Affiliated by Gautam Buddh Technical University (GBTU). She has participated in
different National Workshop. Her areas of interest include Computer Forensic
Investigation, Ethical Hacking & Information Security etc.
View publication statsView publication stats
https://www.researchgate.net/publication/242524844
JISTEM - Journal of Information Systems and Technology Management
Revista de Gestão da Tecnologia e Sistemas de Informação
Vol. 12, No. 2, May/Aug., 2015 pp. 233-244
ISSN online: 1807-1775
DOI: 10.4301/S1807-17752015000200003
___________________________________________________________________________________________
Manuscript first received/Recebido em: 13/11/2013 Manuscript accepted/Aprovado em: 10/04/2015
Address for correspondence / Endereço para correspondência
Khuram Mushtaque,
Federal Urdu University of Arts, Science and Technology, University Rd, Karachi,
Karachi, Paquistão E-mail [email protected]
Kamran Ahsan, Federal Urdu University of Arts, Science and Technology, University Rd, Karachi,
Karachi, Paquistão E-mail [email protected],
Ahmer Umer, Mohammad Ali Jinnah University, Karachi, University Rd, Karachi, Paquistão E-mail
[email protected]
Published by/ Publicado por: TECSI FEA USP – 2015 All rights reserved.
DIGITAL FORENSIC INVESTIGATION MODELS: AN
EVOLUTION STUDY
Khuram Mushtaque
Kamran Ahsan
Federal Urdu University of Arts, Science and Technology, Karachi, Paquistão
,
Ahmer Umer
Mohammad Ali Jinnah University, Karachi, Paquistão
______________________________________________________________________________________________
ABSTRACT
With increased use of technology in organizations and rapid changes in technology
cyber forensic process is also advancing into new ways. In this context, organizations
also need to align their technological infrastructure to meet the challenges in conducting
successful process of forensic investigations to attain maximum and desired benefits of
it. The objective of this article is to perceive the status of different I.T comprising
organizations in terms of cyber crime and forensic investigation process and we take
Pakistan as a case here. For this purpose, a questionnaire was designed to survey
different organizations to find out that how effectively they have secured their
technology infrastructure and how supportive this setup could be for any forensic firm
to perform the forensic investigation in case of occurrence of any cyber crime. In the
critical analysis, the main finding reckoned as flaw found in these organizations was
that they don’t pay much importance to forensic investigation and because of this they
don’t incorporate forensic supportive tools such as employees’ awareness training
programs, clauses in hiring documents and acquiring the services of forensic firms as
per requirement. This ignorance may lead organizations towards different types of
losses in case of occurrence of cyber crime and if this situation is not addressed,
forensic investigation process also could not be as accurate and successful as it has to
be.
Keywords: Cyber Forensic; Organizations; Forensic Models; Cyber Crime; Forensic
Firms
mailto:[email protected]
mailto:[email protected]
mailto:[email protected]
234 Mushtaque, K., Ahsan, K., Umer, A.
JISTEM, Brazil Vol. 12, No. 2, May/Aug., 2015 pp. 233-244 www.jistem.fea.usp.br
1. INTRODUCTION
In current era, majority of large enterprises rely heavily over the usage of
technology in operations and other segments of the business. With the increased
reliance and usage of technology, the risk of cyber crime becomes also more serious in
case of occurrence. To counter this risk, digital forensic investigation firms provide
assistance in conducting the forensic analysis after occurrence of any cyber crime. With
the passage of time, the forensic investigation process has also modified and distributed
into different phases to make this investigation more effective. Every phase has its own
impact over the process of investigation.
(Sivaprasad & JangaJe, 2012): With the introduction of Information Technology
in the business, every organization that comprises IT has started to take benefits of this
technology. This is done by attaining the advantage over other competitors in the
market, by providing new features to the customers after incorporating technology at the
operational side specially, increasing the operational speed and reducing the probability
for any error in operations. (Wen, 2012): IT also assists higher management in the
process of decision making.
(Morozini, Claudio, Ivam. & Reinaldo. 2012): As we all know that room for
improvement and step towards the perfection is always available in every field of the
world, similarly there are very few loop holes in the information technology becoming
key part of the business industry of today. Besides the entire physical infrastructure like
machinery, human resource, buildings etc associate with the organization, information
has also come up as the one of the most important asset of any organization comprising
information technology in their business not to just support the IT operations but also
provide the platform to connect with other business associated partners as well.
(Sladić, Milosavljević & Konjović, 2012): As the information technology relies
heavily and works around the information, therefore it becomes tremendously important
to protect the information by ensuring that no any unauthorized person can get the
access and the integrity and confidentiality remains sustained. (Belabed, Aimeur, &
Chikh, 2012): Ensure the timely availability of the information for associated operations
and secure these operations from the different threats such e.g. Phishing are vital tasks
for the technical persons for their organization.
(Den & Warnier, 2013): While organizations investing towards launching,
updating and securing the security of their technology associated infrastructure and
operations, still, threat of cyber crimes remains alive and open which could not just
exploit the Data breaches badly but also could cause ruining to their entire business or
also might affect some or large extent. (Pérez 2013): The biggest threat of such type is
the threat from the insiders and they keep seeking for the right opportunity to commit
their cyber crime in order to achieve their illegitimate objectives. Therefore
identification of threat becomes another crucial segment needs to be monitored and
controlled.
(Onome, Thereza & Formigoni, 2013): In order to deal with such criminals,
along with annual external audit, many organizations have started acquiring the services
of digital forensic firms. These digital forensic firms comprise with forensic experts and
technical persons to provide their clients or organizations complete solution to their
cyber crime affected scenarios. As these firms have no stack or association with any
insider of organizations, therefore the investigations provided them remain trust worthy.
Digital forensic investigation models: An evolution study 235
JISTEM, Brazil Vol. 12, No. 2, May/Aug., 2015 pp. 233-244 www.jistem.fea.usp.br
(Ma, Sun & Wang, 2011): Different models are followed by every forensic firm
depending on the target organization and the type or intensity of the loss by committed
cyber crime. These models are based on different phases containing different sets of
steps in order to gather the valuable and effective evidences against the culprit of that
crime which carry out limitation of time and legal constraints in linear course control
and forensic administration to the entire forensic process.
(http://en.wikipedia.org/wiki/Digital_forensics): Forensic firms also ensure that the
evidences generated by them follow all the legal requirements of pertaining
organization and also law of country so that these evidences could become admissible in
the court of law as well if required to present over there.
In current research, first we have described the different models of digital
forensic investigations year by year and have explained all the phases of these models
according to their sequence. This has exhibited the evolution of the digital forensic
investigation around the world and its importance in the different types of business
industry. The core objective of all the described models remains same.
Apart from responsibilities and models used by digital forensic firms, we have
also highlighted numerous addressable elements in different types of organizations of
Pakistan in the context of enabling and helping out the firms to gather effective
evidences as required. These elements if addressed properly could open more and more
options for forensic firms to find better platform in the process of evidence collection
available maximum in the crime scene.
2. FORENSIC MODELS
(Ojo & Adebayo, 2011): Since the introduction of the discipline of Digital
Forensic in the field of Information Technology especially in the corporate business
industry, the persons associated with technology started their efforts in order to
overcome the audit and research challenges associated with digital forensic of the
organizations as much as possible. (Nnoli, Lindskog, Zavarsky, Aghili & Ruhl, 2012): It
was due to their understanding towards the significance of this field in the governance
of IT but also organizations started investing over it after identifying the intensity of
effect it could leave over the business and the economy of organizations. Most
enterprises are seen wasting their precious time, efforts and resources to implement
digital forensic investigation because of their lacking in awareness towards corporate
forensic.
(Horsman, Laing & Vickers. 2012): The process of digital forensic
investigations, as recommended by experts, must be conducted by its specialist persons
who have totally unbiased approach to ensure trustworthiness over them and image
against the organizations where the investigation will be performed. The remains a
question mark over the internal person as forensic investigation performer and the
evidences produced by internal process might not become as influential as this need to
be in order to establish any culprit in the court of Law.
Figure 1 exhibits the different models launched in different years with the
objective to provide guidelines to the Digital forensic investigative firms. Every model
is divided in different steps and these steps kept expending as the time progresses and
with the increase and identification of importance of the process of digital forensic
investigation.
http://en.wikipedia.org/wiki/Digital_forensics
236 Mushtaque, K., Ahsan, K., Umer, A.
JISTEM, Brazil Vol. 12, No. 2, May/Aug., 2015 pp. 233-244 www.jistem.fea.usp.br
3. RESEARCH METHODOLOGY
Research methodology used in this research is questionnaire based survey
because by survey provides unbiased and different types of feedbacks. After gathering it
useful analysis can be produced addressing particular topic of interest which could
become significant for the future decision making in that specific field. For this
research, a question based on 72 questions related to digital forensic was designed and
distributed in 80 different types of large enterprises comprising I.T. The feedbacks
provided us significant information about the status of the technological and other
issues related to forensic investigation procedure in these organizations. This attained
information was later on analyzed in different angels to perform the critical analysis and
highlight the addressable elements in large enterprises in this regard.
Evolution of Digital Forensic Investigation Models
P
h
a
se
s
11. Results &
review
9. Returning
evidence 10. Presentation
8. Presentation 9. Analysis
7. Analysis 8. Examination
6. Examination
7. Evidence
gathering
5. Collection 5. Review
6. Communication.
5. Shielding
4. Reporting 4. Preservation
4. Digital Crime
Scene Investigation
4. Scene
documentation
3. Analysis 3. Approach
3. Physical Crime
Scene Investigation
3. Survey &
recognition
2. Examination 2. Preparations 2. Deployment 2. Secure scene
1. Collection 1. Identification 1. Readiness 1. Preparation
Figure 1: Forensic Models
(Valjarevic & S.Venter, 2012): The first digital forensic model was introduced in
2001. The instigator of this project was Ashcroft who was associated with the U.S
National Institute of Justice. This model contained investigation process of crime scene
associated with the electronic field and it become a guideline for the responders who
were very novice to it. Later on, this model was also utilized by the law enforcement
and other agencies to secure and identify the digital evidences.
2001 2002 2003 2011
Digital forensic investigation models: An evolution study 237
JISTEM, Brazil Vol. 12, No. 2, May/Aug., 2015 pp. 233-244 www.jistem.fea.usp.br
The first (out of four) phase of this model is about the collection of the evidences
after performing a thorough search process around the crime scene. Second phase
contained the process of examination of which is to put together the evidences collected
from previous phase as transparent and identify its source as well. Third phase is to
perform the analysis of outcome of the phase of examination. After the analysis, last
phase comprise reporting and drawing of outcomes of all previous phases and the
information that was collected in entire process.
However, the only constraint of this model is that it remains unclear and is not
explained properly.
Following the model of 2001, in 2002 Carr, Reith and Gunsch made an effort to
further clarify the digital forensic investigation model by adding some more phases into
this process. They incorporated the traditional approach of accumulating the evidences
to simplify in this model.
First phase of this model is to identify the occurred incident and its type and
provide all the assistance to achieve the goal of this phase. Second phase is to get
prepared regarding the methods and the procedures which will be used in remaining
phases of this forensic model. It also guides about the preparation of different search
warrants if required in order to gather the evidences. Third phase is to devise
appropriate approaches and processes which will be adopted in the fifth phase of
evidence gathering.
Fourth phase of preservation is to preserve all the components and devices
potentially containing the relevant evidences. After securing the evidence containing
devices and components, fifth phase of collection is used to unify the procedures in
order to record the physical scene. Sixth phase is to examine, which treats with the
finding of the relevant suspect of the crime that was committed. Seventh phase is to
analyze the importance of items on which the inspection has been performed.
Presentation of the all phases that are involved in this model is the phase which
comes at later stage after the analysis phase while last and ninth phase contains the
process of returning the devices and sources of digital evidences to the real owner after
accomplishment of the task of forensic investigation.
The only flaw or room for improvement in this phase indentified is that the third
phase is quite similar to the second phase to some degree.
Third model of digital forensic investigation was introduced by Spafford and
Carrier in 2003. This model was named as Integrated Digital Investigation Process and
became another guideline for the forensic examiners in order to perform digital forensic
investigation and gather the evidences. This model was again resized into five phases.
The objective of first and initial phase named as readiness phase was to ensure
that the actions and provided infrastructure are good enough to favor and assist the
investigation process appropriately. Therefore this phase is used only to get ready for
the remaining phases of investigation process. Second phase is of deployment, it
supplies a system to the forensic examiners through which they could become capable
to detect and incident and then certify it.
Third phase is about the gathering and examining the physical evidences from
the crime scene and go through the keen observation of the acts that where associated
during the incident was occurring. Fourth phase is sequel to third phase, but it deals
with the examining and gathering of digital evidences which were obtained by the
238 Mushtaque, K., Ahsan, K., Umer, A.
JISTEM, Brazil Vol. 12, No. 2, May/Aug., 2015 pp. 233-244 www.jistem.fea.usp.br
physical crime scene investigation phase. The remaining process used in phase is
similar to the third phase of this model. Fifth and final phase is to review the entire
analysis that was performed during previous phases of digital forensic investigation
process and then underline those areas where the room for improvement exists.
The reason behind this model not being used mostly and not known as the best
model for digital forensic investigation is that deployment phase of this model deals
with the certification of the occurred incident, on the other hand practically it is
impossible to endorse the digital crime earlier than appropriate investigation.
(Khan, Kock & Memon, 2010): In 2004 a Ciardhuain proposed a model for
digital forensic investigation which didn’t have detailed phases and proper guidelines
therefore it could not get familiar and in utilization as the previous models. (Ademu,
Imafidon & Preston, 2011):Similarly in 2005 Ruibin Yun and in 2009 Perusal proposed
their models for investigation and evidences collection but had same lacking of unclear
and detailed explanation of their process and also they didn’t categorized their models
into separate phases. Therefore these models also couldn’t get the identification and
credit as they needed to be.
(Ankit Megha, Saurabh & Gupta. 2011): In 2011 Preston, Ademu and Imafidon
proposed their model for investigation process which became the most recent guideline
with utmost detailed description of phases and the distribution of the entire process into
separate phases. This model was titled as systematic digital forensic investigation model
(SRDHM) and it contained 11 phases to perform investigation process.
First phase of this model was preparatory phase as it has to be in the initial stage
of an investigation process. In this phase, the forensic examiner obtains the
understanding that what type of the crime has been committed and what are the
activities which were associated during occurrence of the crime. Then examiner plans
about the material that was collected in order to pack the sources of evidences. Besides,
examiner must also keep in mind about the different legal constraints and the target
organizational limitations as well.
In this phase, if required, examiner also attain the relevant and necessary search
warrants, different authorizations from the higher management with their full support
and dispatching of the legal notices to all the relevant segments or parties associated
with the committed crime. Another vital function performed in this phase is to design a
proper policy that will be adopted during the inquiry.
Second important phase is to protect the crime scene in order to sustain the
integrity of all the evidences and devices at the crime scene. These devices may come
up as the main sources of evidences at any stage of investigation. For this, examiner
makes sure that no any unauthorized person gets the access of these devices after the
investigation process started. Quality of evidence is also decided in this phase. But the
main theme of this phase is ensuring the integrity of the crime scene and its
infrastructure.
After performing first two phases successfully, an initial survey is conducted by
examiner to the crime scene with the objective of identifying the sources of evidences
and brings up an strategy to start looking for evidences. During the evaluation of
electronic devices examiner may require aid from other experts as well in order to deal
the crime scene. Interviewing the relevant persons after their identifications is another
function of this phase performed preliminarily.
Digital forensic investigation models: An evolution study 239
JISTEM, Brazil Vol. 12, No. 2, May/Aug., 2015 pp. 233-244 www.jistem.fea.usp.br
Significant and effective information gathering can be done by inquiring the
different users, administrators or even from the owners of the devices which could
produce key evidences for examination. After collecting and developing the evidences
from this phase, examiner should also plan that how to analyze these evidences in the
later stages of this process in different phases.
Documentation of the entire scene is also another key phase of this model for
investigation process. It includes the documenting of all the gathered data that is visible
such as different snaps etc. This may help to review the entire process at any stage. All
the logs and records about people’s entrance and exit from the crime scene also must be
documented with the date and its time.
In fifth phase of current model, examiner list downs the all possible
communication ways of the associated devices and blocking these communication
systems so that nobody could alter, modify, delete or overwrite the information after the
process of examination starts. This might be done by isolating these devices completely
with all other connected devices. Blocking Bluetooth and wireless services are two most
common ways of communication that must be considered by the examiner in this phase.
Sixth phase, which might be the most important phase of all, is to gather the
evidences. This is the primary objective of entire investigation model and all phases of
it. This phase requires keen consideration and attention to design a most effective
system through which the desired and evidences can be gathered which later on could
be presented in the court of law and get the status of admissible over there as well to
establish the culprit.
To collect volatile evidences from the devices especially from mobile devices
need quick decision making as the data in ROM can be modified. Quick response is also
needed if the battery of evidence source is low. In this case, image can be created of
entire data existed on that device and then it can be dispatched to any other device to
analyze easily and freely. For this sake, tools used in this process for image creation
also must be best and swiftest. Another way is to replace the low battery with the newer
one and then perform the examination and gathering of evidences without restraint.
Second type evidences gathered is non volatile evidences. Such evidences more
than often exist in the external media such as flash drives etc. Here again, examiner
needs effective and appropriate tools for gathering the evidences from such storage
medias. Different methods can be used to assure the integrity of the gathered evidences
such as the method of write protect and hashing.
Evidences, which were collected in the previous phase, need to be packed,
transported and stored as properly in the electronic devices so that nobody could harm
or modify them. This is done in this phase of the model. All necessary and universal
techniques must be adopted in order to secure such electronic devices such as supply of
the required temperature, saving it from the dust etc after the packaging process done.
After the successful packaging and transportation of gathered evidences, in this
phase, these evidences are examined by the expert forensic examiners. After this phase,
the team of experts analyzes these evidences and defines the relationship between
different segments of data, disclose the data that was hidden and provide the results of
all phases of entire forensic model in the end.
After the successful gathering of evidences and analyzes by the forensic experts,
these evidences need to be presented in front of any authority such as the higher
management of the targeted organization or in front of court of law. Therefore, these
240 Mushtaque, K., Ahsan, K., Umer, A.
JISTEM, Brazil Vol. 12, No. 2, May/Aug., 2015 pp. 233-244 www.jistem.fea.usp.br
evidences must be presented in a form that clearly exhibits that the person highlighted
as culprit is in real a culprit and all the presented evidences are supporting this claim as
well.
Reviewing the result is the final phase of this model. All the steps performed in
the previous all phases are keenly reviewed and analyzed. Many lessons and room for
improvement can come up after performing the review of all steps one by one. These
lessons may help examiners to incorporate them in the next coming investigations in the
future.
4. FINDINGS
In our findings of current research, we have highlighted the different important
security elements that need to be addressed by enterprises of Pakistan as
effectively and appropriately that it assists the digital forensic examination
process towards collecting the evidences and establishing the actual culprit
behind the committed cyber crime.
Every element highlighted here is equally importance as it possesses capability
to provide evidence or hint or even provides the path the reach out the offender
of cyber crime and then prove in the court of Law as legitimized matter.
Large Enterprise Issues: Addressable Elements
Only 55\% of recipients are fully aware about the Domain of Cyber Forensics. It
means that 45\% organizations have employed the I.T persons who are
considered to be most responsible and considered as reliable I.T person don’t
even know anything about the Domain of Cyber Forensics, it is really alarming
situation and addressable too.
58\% organizations don’t have a formal, institutional plan that outlines Digital
Forensics for the institution as a whole. It means that if any situation arises to
conduct a Digital Forensic Investigations then the employees may deny any
responsibility since this section is not addressed by the institutional plan at all.
50\% of the organizations may collapse by single incident in the absence of
Cyber Forensic Policy and procedure. It shows the significance of this domain
needs to be addressed at enterprise level and also reveals the flaws in the I.T
security level in these organizations.
79\% of organizations don’t even acquire the service of cyber forensic firms.
46\% of organizations’ I.T operations section is being spoiled mostly affected by
cyber crime.
51\% or organizations don’t conduct any awareness training programs for
employees to educate them about cyber crime and forensics. It is quite shocking
situation because if we don’t educate our employees to face any such situation or
avoid or prevent it, then how may we expect that our security measure are up to
the mark.
47\% enterprises don’t contain any clause addressing the cyber crime in their
hiring terms and conditions document. It needs to be addressed to ensure the
function of accountability against the employees.
73\% organizations don’t employ any tool to record the key strokes of client. It
eliminates another effective element of collecting evidences therefore must be
addressed.
Digital forensic investigation models: An evolution study 241
JISTEM, Brazil Vol. 12, No. 2, May/Aug., 2015 pp. 233-244 www.jistem.fea.usp.br
28\% organizations don’t use cameras as per requirement of recording the
physical activities. Physical evidences are often undeniable in the court of law
therefore need to work on it as well to rectify it.
25\% companies store the recorded videos forever, while only 15\% perform it for
1 year. The requirement of these durations may vary organization to
organization by considering its nature of business, but still this sector should be
improved.
If the primary media of recorded videos is lost then backup of these videos
becomes essential. 25\% organizations don’t opt to take backups of videos is not
reckoned as fool proof scenario.
If we allow employees to use their blue-tooth service freely, especially in the
financial institution like Banks which contain extremely confidential
information of customers then it will be mentioned as a vulnerable part of I.T
security as well. 57\% of organizations don’t restrict their employees or other to
use blue-tooth inside the organization, which is highlight able matter.
33\% of organizations allow their employees to download freeware on their
computers. This percentage is worry because freeware downloading may cause
some security or monitoring tools troubles to record or collect the appropriate
evidences.
28\% of enterprises don’t adopt any mechanism and monitor the downloading or
installing new applications in the client systems. This ought to be addressed to
…
CATEGORIES
Economics
Nursing
Applied Sciences
Psychology
Science
Management
Computer Science
Human Resource Management
Accounting
Information Systems
English
Anatomy
Operations Management
Sociology
Literature
Education
Business & Finance
Marketing
Engineering
Statistics
Biology
Political Science
Reading
History
Financial markets
Philosophy
Mathematics
Law
Criminal
Architecture and Design
Government
Social Science
World history
Chemistry
Humanities
Business Finance
Writing
Programming
Telecommunications Engineering
Geography
Physics
Spanish
ach
e. Embedded Entrepreneurship
f. Three Social Entrepreneurship Models
g. Social-Founder Identity
h. Micros-enterprise Development
Outcomes
Subset 2. Indigenous Entrepreneurship Approaches (Outside of Canada)
a. Indigenous Australian Entrepreneurs Exami
Calculus
(people influence of
others) processes that you perceived occurs in this specific Institution Select one of the forms of stratification highlighted (focus on inter the intersectionalities
of these three) to reflect and analyze the potential ways these (
American history
Pharmacology
Ancient history
. Also
Numerical analysis
Environmental science
Electrical Engineering
Precalculus
Physiology
Civil Engineering
Electronic Engineering
ness Horizons
Algebra
Geology
Physical chemistry
nt
When considering both O
lassrooms
Civil
Probability
ions
Identify a specific consumer product that you or your family have used for quite some time. This might be a branded smartphone (if you have used several versions over the years)
or the court to consider in its deliberations. Locard’s exchange principle argues that during the commission of a crime
Chemical Engineering
Ecology
aragraphs (meaning 25 sentences or more). Your assignment may be more than 5 paragraphs but not less.
INSTRUCTIONS:
To access the FNU Online Library for journals and articles you can go the FNU library link here:
https://www.fnu.edu/library/
In order to
n that draws upon the theoretical reading to explain and contextualize the design choices. Be sure to directly quote or paraphrase the reading
ce to the vaccine. Your campaign must educate and inform the audience on the benefits but also create for safe and open dialogue. A key metric of your campaign will be the direct increase in numbers.
Key outcomes: The approach that you take must be clear
Mechanical Engineering
Organic chemistry
Geometry
nment
Topic
You will need to pick one topic for your project (5 pts)
Literature search
You will need to perform a literature search for your topic
Geophysics
you been involved with a company doing a redesign of business processes
Communication on Customer Relations. Discuss how two-way communication on social media channels impacts businesses both positively and negatively. Provide any personal examples from your experience
od pressure and hypertension via a community-wide intervention that targets the problem across the lifespan (i.e. includes all ages).
Develop a community-wide intervention to reduce elevated blood pressure and hypertension in the State of Alabama that in
in body of the report
Conclusions
References (8 References Minimum)
*** Words count = 2000 words.
*** In-Text Citations and References using Harvard style.
*** In Task section I’ve chose (Economic issues in overseas contracting)"
Electromagnetism
w or quality improvement; it was just all part of good nursing care. The goal for quality improvement is to monitor patient outcomes using statistics for comparison to standards of care for different diseases
e a 1 to 2 slide Microsoft PowerPoint presentation on the different models of case management. Include speaker notes... .....Describe three different models of case management.
visual representations of information. They can include numbers
SSAY
ame workbook for all 3 milestones. You do not need to download a new copy for Milestones 2 or 3. When you submit Milestone 3
pages):
Provide a description of an existing intervention in Canada
making the appropriate buying decisions in an ethical and professional manner.
Topic: Purchasing and Technology
You read about blockchain ledger technology. Now do some additional research out on the Internet and share your URL with the rest of the class
be aware of which features their competitors are opting to include so the product development teams can design similar or enhanced features to attract more of the market. The more unique
low (The Top Health Industry Trends to Watch in 2015) to assist you with this discussion.
https://youtu.be/fRym_jyuBc0
Next year the $2.8 trillion U.S. healthcare industry will finally begin to look and feel more like the rest of the business wo
evidence-based primary care curriculum. Throughout your nurse practitioner program
Vignette
Understanding Gender Fluidity
Providing Inclusive Quality Care
Affirming Clinical Encounters
Conclusion
References
Nurse Practitioner Knowledge
Mechanics
and word limit is unit as a guide only.
The assessment may be re-attempted on two further occasions (maximum three attempts in total). All assessments must be resubmitted 3 days within receiving your unsatisfactory grade. You must clearly indicate “Re-su
Trigonometry
Article writing
Other
5. June 29
After the components sending to the manufacturing house
1. In 1972 the Furman v. Georgia case resulted in a decision that would put action into motion. Furman was originally sentenced to death because of a murder he committed in Georgia but the court debated whether or not this was a violation of his 8th amend
One of the first conflicts that would need to be investigated would be whether the human service professional followed the responsibility to client ethical standard. While developing a relationship with client it is important to clarify that if danger or
Ethical behavior is a critical topic in the workplace because the impact of it can make or break a business
No matter which type of health care organization
With a direct sale
During the pandemic
Computers are being used to monitor the spread of outbreaks in different areas of the world and with this record
3. Furman v. Georgia is a U.S Supreme Court case that resolves around the Eighth Amendments ban on cruel and unsual punishment in death penalty cases. The Furman v. Georgia case was based on Furman being convicted of murder in Georgia. Furman was caught i
One major ethical conflict that may arise in my investigation is the Responsibility to Client in both Standard 3 and Standard 4 of the Ethical Standards for Human Service Professionals (2015). Making sure we do not disclose information without consent ev
4. Identify two examples of real world problems that you have observed in your personal
Summary & Evaluation: Reference & 188. Academic Search Ultimate
Ethics
We can mention at least one example of how the violation of ethical standards can be prevented. Many organizations promote ethical self-regulation by creating moral codes to help direct their business activities
*DDB is used for the first three years
For example
The inbound logistics for William Instrument refer to purchase components from various electronic firms. During the purchase process William need to consider the quality and price of the components. In this case
4. A U.S. Supreme Court case known as Furman v. Georgia (1972) is a landmark case that involved Eighth Amendment’s ban of unusual and cruel punishment in death penalty cases (Furman v. Georgia (1972)
With covid coming into place
In my opinion
with
Not necessarily all home buyers are the same! When you choose to work with we buy ugly houses Baltimore & nationwide USA
The ability to view ourselves from an unbiased perspective allows us to critically assess our personal strengths and weaknesses. This is an important step in the process of finding the right resources for our personal learning style. Ego and pride can be
· By Day 1 of this week
While you must form your answers to the questions below from our assigned reading material
CliftonLarsonAllen LLP (2013)
5 The family dynamic is awkward at first since the most outgoing and straight forward person in the family in Linda
Urien
The most important benefit of my statistical analysis would be the accuracy with which I interpret the data. The greatest obstacle
From a similar but larger point of view
4 In order to get the entire family to come back for another session I would suggest coming in on a day the restaurant is not open
When seeking to identify a patient’s health condition
After viewing the you tube videos on prayer
Your paper must be at least two pages in length (not counting the title and reference pages)
The word assimilate is negative to me. I believe everyone should learn about a country that they are going to live in. It doesnt mean that they have to believe that everything in America is better than where they came from. It means that they care enough
Data collection
Single Subject Chris is a social worker in a geriatric case management program located in a midsize Northeastern town. She has an MSW and is part of a team of case managers that likes to continuously improve on its practice. The team is currently using an
I would start off with Linda on repeating her options for the child and going over what she is feeling with each option. I would want to find out what she is afraid of. I would avoid asking her any “why” questions because I want her to be in the here an
Summarize the advantages and disadvantages of using an Internet site as means of collecting data for psychological research (Comp 2.1) 25.0\% Summarization of the advantages and disadvantages of using an Internet site as means of collecting data for psych
Identify the type of research used in a chosen study
Compose a 1
Optics
effect relationship becomes more difficult—as the researcher cannot enact total control of another person even in an experimental environment. Social workers serve clients in highly complex real-world environments. Clients often implement recommended inte
I think knowing more about you will allow you to be able to choose the right resources
Be 4 pages in length
soft MB-920 dumps review and documentation and high-quality listing pdf MB-920 braindumps also recommended and approved by Microsoft experts. The practical test
g
One thing you will need to do in college is learn how to find and use references. References support your ideas. College-level work must be supported by research. You are expected to do that for this paper. You will research
Elaborate on any potential confounds or ethical concerns while participating in the psychological study 20.0\% Elaboration on any potential confounds or ethical concerns while participating in the psychological study is missing. Elaboration on any potenti
3 The first thing I would do in the family’s first session is develop a genogram of the family to get an idea of all the individuals who play a major role in Linda’s life. After establishing where each member is in relation to the family
A Health in All Policies approach
Note: The requirements outlined below correspond to the grading criteria in the scoring guide. At a minimum
Chen
Read Connecting Communities and Complexity: A Case Study in Creating the Conditions for Transformational Change
Read Reflections on Cultural Humility
Read A Basic Guide to ABCD Community Organizing
Use the bolded black section and sub-section titles below to organize your paper. For each section
Losinski forwarded the article on a priority basis to Mary Scott
Losinksi wanted details on use of the ED at CGH. He asked the administrative resident