wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Electronic Evidence in Cyber Forensics

profile
16_Sahil Jaiswar
Jan 10, 2024
0 Likes
0 Discussions
109 Reads

Electronic evidence in cyber forensics is the process of collecting, preserving, analyzing, and presenting digital data that can be used to prove or disprove a cybercrime. 

 

Electronic evidence can be found in various devices, such as computers, smartphones, tablets, hard drives, flash drives, memory cards, CDs, DVDs, etc. 

 

Electronic evidence can also be stored in online platforms, such as email accounts, social media profiles, cloud services, etc.

 

Some examples of electronic evidence are:

 

- Files, folders, documents, images, videos, audio, etc. that are stored in a device or online.

 

- Metadata, such as file names, dates, sizes, locations, etc. that provide additional information about the data.

 

- Logs, such as browsing history, cookies, cache, etc. that record the user's online activities.

 

- Network data, such as IP addresses, MAC addresses, packets, etc. that identify the source and destination of the data transmission.

 

- Digital signatures, encryption, passwords, etc. that protect the data from unauthorized access or modification.

 

However, electronic evidence also faces challenges, such as alteration, deletion, corruption, tracing, locating, accessing, legal standards, rules, procedures, and technological changes.

 

Therefore, cyber forensics experts need to use tools, techniques, methods, and standards to collect, preserve, analyze, and present electronic evidence reliably and admissibly.

 

Some of these tools, techniques, and methods are:

 

- Forensic software, such as EnCase, FTK, Autopsy, etc. that can extract, recover, or analyze data from various sources and formats.

 

- Forensic hardware, such as write blockers, duplicators, imagers, etc. that can prevent or minimize the alteration or damage of the data during the acquisition process.

 

- Forensic procedures, such as chain of custody, documentation, verification, etc. that can ensure the integrity, authenticity, and continuity of the evidence from the crime scene to the court.

 

- Forensic standards, such as ISO, NIST, SWGDE, etc. that can provide guidelines, best practices.

 

Electronic evidence can help to solve, prevent, or deter cybercrimes and to protect the rights, interests, and security of the individuals, organizations, and society.

 

Reference:

 

forensicsciencesimplified.org

 

IACP

 

Cyfor.co

 


Comments ()


Sign in

Read Next

Deadlock in Operating System

Blog banner

Deadlock

Blog banner

ASANA- A Management System.

Blog banner

Buffering

Blog banner

Artical on FreshBooks

Blog banner

Landslide Hazard

Blog banner

Emotional Intelligence in Children: Why It Is as Important as Academics

Blog banner

Networking 101: How to Build Meaningful Connections in College

Blog banner

OS- Assignnment 1

Blog banner

Danger assessment in GIS

Blog banner

Kids Grieve Too

Blog banner

ADD A SPICE TO YOUR LIFE.

Blog banner

HOW CAN SOCIAL MEDIA MAKE YOU HAPPIER?

Blog banner

Street foods

Blog banner

PYTHON

Blog banner

Dekkers Algorithm

Blog banner

15 Interesting Facts about India

Blog banner

Hot Mango Pickle (Methiyu)

Blog banner

STARVATION

Blog banner

RAID - LEVELS OF RAID

Blog banner

Blog name

Blog banner

Data Mapping

Blog banner

Types of Threads

Blog banner

Pro-Tips On How To Keep your Foot Healthy

Blog banner

I/O Buffering

Blog banner

5 Interesting facts about Diwali

Blog banner

A-B-C of Networking: Part-3 (Topology [Bus & Star])

Blog banner

What are Tenders its various types

Blog banner

Virtual Machine

Blog banner

Electronic Funds Transfer

Blog banner

Digital black market or dark net poses a national security threat?

Blog banner

Void

Blog banner

Beautiful and stunning natural phenomena worth to see

Blog banner

Smartsheet

Blog banner

What is a Malware ?

Blog banner

Critical success factors

Blog banner

Goa Trip With Friends

Blog banner

Search Marketing In 2026: From Keywords To Credibility And User Intent

Blog banner

Functions of operating system

Blog banner

File Management

Blog banner

I/O Buffering

Blog banner

Why Extreme Opinions Are Rising: Psychological Insights into Society’s Divides

Blog banner