Generic Computer Forensic Investigation Model (GCFIM)
Name of Student
Institute Affiliation
Course
Supervisor
Due Date
Generic Computer Forensic Investigation Model (GCFIM)
Generic Computer Forensic Investigation Model (GCFIM) main purpose is to give a beginning point when it comes to dealing with computer crime cases. It is applicable in every scene. This helps when choosing the right tool to use for the computer crime investigation. This model’s phases are five, which take the investigators through a systematic way of investigating. The first phase is the pre-process, which involves all the processes required before the actual investigation and data collection begins (Yusoff et al., 2011). The second phase is the acquisition and preservation, where the data is identified, acquired, collected, transported, stored, and preserved.
The third phase is the analysis, which is the focus of a computer forensic investigation. It is the longest process among the phases and performed intending to seek out the crime source. The fourth phase is the presentation. The finding from the analysis stage is documented and presented to the authority in a manner that can be well understood. The final phase is the post-process where the investigation is properly closed, and all the digital and physical evidence is given back to its owner.
I agree with the author’s thoughts about the model being more efficient than the others because the investigation model was designed specifically for an investigator to go back to the previous phase easily. The model does not cancel out that the investigator can face changeable situations regarding the crime scenes, used tools, and skill levels (Ninkyhade, 2018). It is more flexible than the other models, which is an advantage of increasing criminal activity numbers.
References
Yusoff, Y., Ismail, R., & Hassan, Z. (2011). Common phases of computer forensics investigation models. International Journal of Computer Science & Information Technology (IJCSIT), 3(3). Retrieved from http://airccse.org/journal/jcsit/0611csit02.pdf
Ninkyhade. (2018, August 29). Model Investigasi pada Paper: “Common Phases of Computer Forensics Investigation Models.” Retrieved August 07, 2020, from https://mappesona.me/2015/06/10/model-investigasi-pada-paper-common-phases-of-computer-forensics-investigation-models/