wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Electronic Evidence in Cyber Forensics

profile
16_Sahil Jaiswar
Jan 10, 2024
0 Likes
0 Discussions
109 Reads

Electronic evidence in cyber forensics is the process of collecting, preserving, analyzing, and presenting digital data that can be used to prove or disprove a cybercrime. 

 

Electronic evidence can be found in various devices, such as computers, smartphones, tablets, hard drives, flash drives, memory cards, CDs, DVDs, etc. 

 

Electronic evidence can also be stored in online platforms, such as email accounts, social media profiles, cloud services, etc.

 

Some examples of electronic evidence are:

 

- Files, folders, documents, images, videos, audio, etc. that are stored in a device or online.

 

- Metadata, such as file names, dates, sizes, locations, etc. that provide additional information about the data.

 

- Logs, such as browsing history, cookies, cache, etc. that record the user's online activities.

 

- Network data, such as IP addresses, MAC addresses, packets, etc. that identify the source and destination of the data transmission.

 

- Digital signatures, encryption, passwords, etc. that protect the data from unauthorized access or modification.

 

However, electronic evidence also faces challenges, such as alteration, deletion, corruption, tracing, locating, accessing, legal standards, rules, procedures, and technological changes.

 

Therefore, cyber forensics experts need to use tools, techniques, methods, and standards to collect, preserve, analyze, and present electronic evidence reliably and admissibly.

 

Some of these tools, techniques, and methods are:

 

- Forensic software, such as EnCase, FTK, Autopsy, etc. that can extract, recover, or analyze data from various sources and formats.

 

- Forensic hardware, such as write blockers, duplicators, imagers, etc. that can prevent or minimize the alteration or damage of the data during the acquisition process.

 

- Forensic procedures, such as chain of custody, documentation, verification, etc. that can ensure the integrity, authenticity, and continuity of the evidence from the crime scene to the court.

 

- Forensic standards, such as ISO, NIST, SWGDE, etc. that can provide guidelines, best practices.

 

Electronic evidence can help to solve, prevent, or deter cybercrimes and to protect the rights, interests, and security of the individuals, organizations, and society.

 

Reference:

 

forensicsciencesimplified.org

 

IACP

 

Cyfor.co

 


Comments ()


Sign in

Read Next

An Overview of Virtual Machines

Blog banner

The Impact of Cyber Forensics on Corporate Governance and Compliance

Blog banner

Instagram

Blog banner

Data Science in Everyday Life (like a phone, shopping cart, or social media icons)

Blog banner

OS Assignment 3 Deadlock

Blog banner

Malware Defense

Blog banner

Instagram

Blog banner

Deadlock

Blog banner

Trends that began during the pandemic

Blog banner

Deadlock in operating system

Blog banner

Next time you click on "Remind me later", think twice!

Blog banner

Webmail

Blog banner

operating system

Blog banner

Reclaim Your Bite and Beauty: All About Dental Restorative Treatments

Blog banner

Tiranga - Abbas Haveliwala

Blog banner

GIS REMOTE SENSING

Blog banner

HOW CAN SOCIAL MEDIA MAKE YOU HAPPIER?

Blog banner

Twisted world

Blog banner

What is a Malware ?

Blog banner

OS Assignment 1

Blog banner

Disk Management

Blog banner

Why is ITSM important in IT organization?

Blog banner

c

Blog banner

Introduction to Data Science: Life Cycle & Applications

Blog banner

The Rise of Polo Tourism in the USA: How Travellers Are Blending Luxury Stays with Elite Sports

Blog banner

10 Interesting facts you should know!!!

Blog banner

Data Visualization- Importance and tools (Tableau,Power BI, Matplotlib)

Blog banner

What is Virtual Memory

Blog banner

'C', 'C++' and 'Java': Head-to-Head

Blog banner

What is Segmentation?

Blog banner

Why Data Security Is Important

Blog banner

Blockchain Security Technique

Blog banner

Cyber Security in Data Breaching

Blog banner

Developments in Modern Operating Systems

Blog banner

Why Inconel 625 and Monel 400 Remain Unbeatable in Refinery Applications?

Blog banner

ROLE OF THE COMPUTER FORENSICS TOOLS AND TECHNIQUES

Blog banner

What is a geographic information system (GIS)?

Blog banner

Continual service improvement vs maintenance phase in IT

Blog banner

WHAT IS SNAPCHAT AND HOW DOES IT WORK?

Blog banner

Operating system

Blog banner

Brain wash of social media

Blog banner

A-B-C of Networking: Part-1 (Basics)

Blog banner