wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Electronic Evidence in Cyber Forensics

profile
16_Sahil Jaiswar
Jan 10, 2024
0 Likes
0 Discussions
109 Reads

Electronic evidence in cyber forensics is the process of collecting, preserving, analyzing, and presenting digital data that can be used to prove or disprove a cybercrime. 

 

Electronic evidence can be found in various devices, such as computers, smartphones, tablets, hard drives, flash drives, memory cards, CDs, DVDs, etc. 

 

Electronic evidence can also be stored in online platforms, such as email accounts, social media profiles, cloud services, etc.

 

Some examples of electronic evidence are:

 

- Files, folders, documents, images, videos, audio, etc. that are stored in a device or online.

 

- Metadata, such as file names, dates, sizes, locations, etc. that provide additional information about the data.

 

- Logs, such as browsing history, cookies, cache, etc. that record the user's online activities.

 

- Network data, such as IP addresses, MAC addresses, packets, etc. that identify the source and destination of the data transmission.

 

- Digital signatures, encryption, passwords, etc. that protect the data from unauthorized access or modification.

 

However, electronic evidence also faces challenges, such as alteration, deletion, corruption, tracing, locating, accessing, legal standards, rules, procedures, and technological changes.

 

Therefore, cyber forensics experts need to use tools, techniques, methods, and standards to collect, preserve, analyze, and present electronic evidence reliably and admissibly.

 

Some of these tools, techniques, and methods are:

 

- Forensic software, such as EnCase, FTK, Autopsy, etc. that can extract, recover, or analyze data from various sources and formats.

 

- Forensic hardware, such as write blockers, duplicators, imagers, etc. that can prevent or minimize the alteration or damage of the data during the acquisition process.

 

- Forensic procedures, such as chain of custody, documentation, verification, etc. that can ensure the integrity, authenticity, and continuity of the evidence from the crime scene to the court.

 

- Forensic standards, such as ISO, NIST, SWGDE, etc. that can provide guidelines, best practices.

 

Electronic evidence can help to solve, prevent, or deter cybercrimes and to protect the rights, interests, and security of the individuals, organizations, and society.

 

Reference:

 

forensicsciencesimplified.org

 

IACP

 

Cyfor.co

 


Comments ()


Sign in

Read Next

Solitary Play Activities for Preschoolers: Types and Benefits

Blog banner

Fashion marketing in india

Blog banner

BENIFITS OF YOGA

Blog banner

Clustering Techniques

Blog banner

Sniffing: A Cyber Security Threat

Blog banner

Current Trends in GIS and Remote Sensing(Ocean Applications)

Blog banner

Delhi city

Blog banner

Memory Management

Blog banner

Bitcoin sent using radio waves! No internet!

Blog banner

ODOO

Blog banner

ZOHO

Blog banner

Virus

Blog banner

Difference Between Classification And Clustering

Blog banner

DBMS and various career options related to it.

Blog banner

De-Coding Love

Blog banner

The New Classic: Indo Western Patola Outfits for Today’s Woman

Blog banner

Virtual memory in Operating System

Blog banner

HACKING MOBILE PLATFORM

Blog banner

Decision Tree: A Diagram Model

Blog banner

child Labour

Blog banner

Memory management

Blog banner

Deadlock in operating system

Blog banner

How Preschool Annual Day Shapes Confidence, Emotions, and Growth

Blog banner

File management

Blog banner

A Tourist’s Guide To Florida’s Rodeo Culture: What To Expect At The Arcadia Championship Rodeo

Blog banner

Loneliness

Blog banner

Blockchain uses and use cases

Blog banner

Hypothesis Testing in Data Science

Blog banner

Atlantis - The Lost Island.........

Blog banner

Spotify

Blog banner

How To Secure Operating Systems ?

Blog banner

Game Theory in Blockchain

Blog banner

Virtual Machine

Blog banner

Landslide Hazard

Blog banner

A MODERN OPERATING SYSTEM

Blog banner

Google App Engine

Blog banner

FREE VERSION OF G-MAIL

Blog banner

Scheduling

Blog banner

SNAPCHAT

Blog banner

Direct Memory Access

Blog banner

Boxing

Blog banner

Understanding the 'Ambiverts'

Blog banner