preview

Criminal Justice Framework

Better Essays

The research for this paper revealed several articles containing proposed frameworks that combine the approaches outlined above in the effort of offering the greatest analysis efficiency alongside data privacy protection. This section focuses on outlining the proposed frameworks, the positive aspects, and any known challenges. Gupta (2013) approaches privacy protection during the forensic investigation process by proposing a framework based on the logic that criminal behavior and evidence remains similar from case to case. The framework consists of three modular stages of an Expert System, Evidence Extraction, and Ranking. The Expert System is a database comprised of historical digital crime cases, case profiles, and stored images of the …show more content…

The reduced data process required only 79 seconds to collect the subset from a 320GM hard drive, which presents a significant reduction in time when compared to the time required to forensically image and verify a hard drive using standard forensic bit-by-bit imaging (2014). The proposed methodology presents an efficient solution for reducing data storage requirements while simultaneously reducing the chances of a privacy violation from reviewing unrelated personal information.
Bashir, Khan, and Bhutto (2015) propose a framework for forensic triage clustering techniques that compare the case evidence against a database of blacklisted information containing information over prior malicious attacks. The framework consists of five phases: (1) identification and isolation of the machine under investigation; (2) data imaging, memory dump, log files, and other system activities; (3) extraction of potential evidence files; (4) triage comparison against the blacklist database; and (5) reporting. The blacklist database contains the history of previous malicious malware or cyber-attacks and allows investigators the ability to use clustering to single out any files matching known attack information. Testing successfully showed a reduction in files needing analysis and provided efficiently accessible information on

Get Access