wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Electronic Evidence in Cyber Forensics

profile
16_Sahil Jaiswar
Jan 10, 2024
0 Likes
0 Discussions
109 Reads

Electronic evidence in cyber forensics is the process of collecting, preserving, analyzing, and presenting digital data that can be used to prove or disprove a cybercrime. 

 

Electronic evidence can be found in various devices, such as computers, smartphones, tablets, hard drives, flash drives, memory cards, CDs, DVDs, etc. 

 

Electronic evidence can also be stored in online platforms, such as email accounts, social media profiles, cloud services, etc.

 

Some examples of electronic evidence are:

 

- Files, folders, documents, images, videos, audio, etc. that are stored in a device or online.

 

- Metadata, such as file names, dates, sizes, locations, etc. that provide additional information about the data.

 

- Logs, such as browsing history, cookies, cache, etc. that record the user's online activities.

 

- Network data, such as IP addresses, MAC addresses, packets, etc. that identify the source and destination of the data transmission.

 

- Digital signatures, encryption, passwords, etc. that protect the data from unauthorized access or modification.

 

However, electronic evidence also faces challenges, such as alteration, deletion, corruption, tracing, locating, accessing, legal standards, rules, procedures, and technological changes.

 

Therefore, cyber forensics experts need to use tools, techniques, methods, and standards to collect, preserve, analyze, and present electronic evidence reliably and admissibly.

 

Some of these tools, techniques, and methods are:

 

- Forensic software, such as EnCase, FTK, Autopsy, etc. that can extract, recover, or analyze data from various sources and formats.

 

- Forensic hardware, such as write blockers, duplicators, imagers, etc. that can prevent or minimize the alteration or damage of the data during the acquisition process.

 

- Forensic procedures, such as chain of custody, documentation, verification, etc. that can ensure the integrity, authenticity, and continuity of the evidence from the crime scene to the court.

 

- Forensic standards, such as ISO, NIST, SWGDE, etc. that can provide guidelines, best practices.

 

Electronic evidence can help to solve, prevent, or deter cybercrimes and to protect the rights, interests, and security of the individuals, organizations, and society.

 

Reference:

 

forensicsciencesimplified.org

 

IACP

 

Cyfor.co

 


Comments ()


Sign in

Read Next

The Five Steps of Data Science

Blog banner

Virtual Memory

Blog banner

SAVE TREES

Blog banner

5 Stages of Digital Marketing

Blog banner

Note on Process, Process creation and Process termination

Blog banner

Khau Galli – Vile Parle

Blog banner

Kafka - A Framework

Blog banner

INTRODUCTION TO C#

Blog banner

Memory management

Blog banner

LinkedIn

Blog banner

Theads

Blog banner

Operating system evolution

Blog banner

Benefits of yoga and meditation

Blog banner

Jamming Attacks in Network Security: Disrupting Communication Signals

Blog banner

Modern Operating System

Blog banner

Operating system

Blog banner

Fitness regime by Deepesh

Blog banner

Routers

Blog banner

Mumbai famous street food

Blog banner

Distributed Denial of Service (DDoS) attack

Blog banner

KASHMIR TRIPS

Blog banner

Study of Backdoor and Trojan tools

Blog banner

Geographic Information Systems(By aditi Unnikrishnan)

Blog banner

Service Operation

Blog banner

DEVELOPMENTS LEADING TO MODERN OPERATING SYSTEMS

Blog banner

Virtual Memory

Blog banner

BUFFER OVERFLOW_142

Blog banner

SECURITY RISKS OF REMOTE WORKING

Blog banner

The Features of Blockchain

Blog banner

DATA WRANGLING

Blog banner

Esri India launches Policy Maps.

Blog banner

The functions of operating system

Blog banner

MYNTRA

Blog banner

The Khan mehtab transforming the modular switches

Blog banner

How Reading Books Shape a Child’s Imagination and Thinking?

Blog banner

"Audit" In Data Science

Blog banner

PERSONALITY DEVELOPMENT

Blog banner

Advanced Persistent Threats (APTs)

Blog banner

Unlocking Success: Mastering Google Ads Strategies

Blog banner

Service Strategy principles

Blog banner

internet email and it's applications

Blog banner

Deadlock

Blog banner