Abstract
Problem statement: The needs of computer forensics investigators have been directly influenced by the increasing number of crimes performed using computers. It is the responsibility of the investigator to ascertain the authenticity of the collected digital evidence. Without proper classification of digital evidence, the computer forensics investigator may ended up investigating using untrusted digital evidence and ultimately cannot be use to implicate the suspected criminal. Approach: The historical methods of verifying the authenticity of a hadith were studied. The similarities between hadith authentication and digital evidence authentication were identified. Based on the similarities of the identified processes, a new method of authenticating digital evidence was proposed, together with the trust calculation algorithm and evidence classification. Results: The new investigation processes and an algorithm to calculate the trust value of given digital evidence was proposed. Furthermore, a simple classification of evidence, based on the calculated trust values was also proposed. Conclusion/Recommendations: We had successfully extracted the methods to authenticate hadith and mapped it into the digital evidence authentication processes. The trust values of digital evidence were able to be calculated and the evidence can be further classified based on the different level of trust values. The ability to classify evidence based on trust levels can offer great assistance to the computer forensics investigator to plan their works and focus on the evidence that would give them a better chance of catching the criminals.
Highlights
We are experiencing the explosive growth of the usage of computers in our daily lives, may it be at the personal or corporate levels
Based on the hadith classifications and mapping it to the calculated trust values, we propose the following classification of the digital evidence: forensic investigators to plan their works and focus on the evidence that would give them a better chance of catching the criminals
We are able to present a noble way of calculating the trust value of a given email based on hadith authentication techniques
Summary
We are experiencing the explosive growth of the usage of computers in our daily lives, may it be at the personal or corporate levels. A great deal of companies and other organizations are using computers to conduct their businesses. Investigators would be required to analyze the digital evidence with the objective to identify the suspected criminals. It is the responsibility of the investigator to ascertain the authenticity of the collected digital evidence. Unless the evidence can be proven to be authentic and reliable, it would be meaningless to present it in the court of law. As such, it is of a paramount important for the forensic investigator to conduct the investigation process properly and based on acceptable practices
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.