wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Electronic Evidence in Cyber Forensics

profile
16_Sahil Jaiswar
Jan 10, 2024
0 Likes
0 Discussions
109 Reads

Electronic evidence in cyber forensics is the process of collecting, preserving, analyzing, and presenting digital data that can be used to prove or disprove a cybercrime. 

 

Electronic evidence can be found in various devices, such as computers, smartphones, tablets, hard drives, flash drives, memory cards, CDs, DVDs, etc. 

 

Electronic evidence can also be stored in online platforms, such as email accounts, social media profiles, cloud services, etc.

 

Some examples of electronic evidence are:

 

- Files, folders, documents, images, videos, audio, etc. that are stored in a device or online.

 

- Metadata, such as file names, dates, sizes, locations, etc. that provide additional information about the data.

 

- Logs, such as browsing history, cookies, cache, etc. that record the user's online activities.

 

- Network data, such as IP addresses, MAC addresses, packets, etc. that identify the source and destination of the data transmission.

 

- Digital signatures, encryption, passwords, etc. that protect the data from unauthorized access or modification.

 

However, electronic evidence also faces challenges, such as alteration, deletion, corruption, tracing, locating, accessing, legal standards, rules, procedures, and technological changes.

 

Therefore, cyber forensics experts need to use tools, techniques, methods, and standards to collect, preserve, analyze, and present electronic evidence reliably and admissibly.

 

Some of these tools, techniques, and methods are:

 

- Forensic software, such as EnCase, FTK, Autopsy, etc. that can extract, recover, or analyze data from various sources and formats.

 

- Forensic hardware, such as write blockers, duplicators, imagers, etc. that can prevent or minimize the alteration or damage of the data during the acquisition process.

 

- Forensic procedures, such as chain of custody, documentation, verification, etc. that can ensure the integrity, authenticity, and continuity of the evidence from the crime scene to the court.

 

- Forensic standards, such as ISO, NIST, SWGDE, etc. that can provide guidelines, best practices.

 

Electronic evidence can help to solve, prevent, or deter cybercrimes and to protect the rights, interests, and security of the individuals, organizations, and society.

 

Reference:

 

forensicsciencesimplified.org

 

IACP

 

Cyfor.co

 


Comments ()


Sign in

Read Next

Security issues

Blog banner

Festive Ethnic Wear Guide: Patola-Inspired Looks for Every Celebration

Blog banner

This Windows 11 encryption bug may cause data damage

Blog banner

Apache Spark :- Powerful Data Processing Tool

Blog banner

NETWORK SECURITY RISKS

Blog banner

Fitness

Blog banner

DISK SCHEDULING

Blog banner

Internet of Things

Blog banner

Unlocking Success: Mastering Google Ads Strategies

Blog banner

Why Friendship at Work is Important

Blog banner

Threads Concurrency: Mutual Exclusion and Synchronization

Blog banner

Types of Viruses

Blog banner

Proof-of-Stake (PoS)

Blog banner

Operating System

Blog banner

What are Virtual Machines

Blog banner

Tea, Coffee, Red Wine, and Teeth: A Stain Survival Guide

Blog banner

How to Encrypt and Decrypt Using GNU PGP

Blog banner

COMPUTER FORENSICS AND GRAPHICS

Blog banner

Virtual memory in os

Blog banner

Procedure For Corporate High-Tech Investigations

Blog banner

note taker app

Blog banner

Memory Management - operating system

Blog banner

NodeJs

Blog banner

Security issues

Blog banner

SWEET SHREDDED MANGO CHUNDA (MANGO CHUNDA)

Blog banner

Meal Maharaj — 3 CP, 5 CP, 8 CP. Same Love, Different Portions

Blog banner

Security Breaches in Stock market trading

Blog banner

Disk Management

Blog banner

File Systems in OS.

Blog banner

What is OS Fingerprinting?

Blog banner

Domain Name System

Blog banner

The Impact of Tolerances and Wall Thickness on Pipeline Integrity

Blog banner

All you need to know about Website Traffic

Blog banner

Firewall

Blog banner

Virtual memory in Operating System

Blog banner

KEAP MANAGEMENT SYSTEM

Blog banner

Deadlock

Blog banner

Tomato Butter Sauce with Bucatini

Blog banner

What is thread and multithreading ?

Blog banner

Health is Wealth

Blog banner

R Programming

Blog banner

Cyber Forensic in the Banking sector

Blog banner