wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Electronic Evidence in Cyber Forensics

profile
16_Sahil Jaiswar
Jan 10, 2024
0 Likes
0 Discussions
109 Reads

Electronic evidence in cyber forensics is the process of collecting, preserving, analyzing, and presenting digital data that can be used to prove or disprove a cybercrime. 

 

Electronic evidence can be found in various devices, such as computers, smartphones, tablets, hard drives, flash drives, memory cards, CDs, DVDs, etc. 

 

Electronic evidence can also be stored in online platforms, such as email accounts, social media profiles, cloud services, etc.

 

Some examples of electronic evidence are:

 

- Files, folders, documents, images, videos, audio, etc. that are stored in a device or online.

 

- Metadata, such as file names, dates, sizes, locations, etc. that provide additional information about the data.

 

- Logs, such as browsing history, cookies, cache, etc. that record the user's online activities.

 

- Network data, such as IP addresses, MAC addresses, packets, etc. that identify the source and destination of the data transmission.

 

- Digital signatures, encryption, passwords, etc. that protect the data from unauthorized access or modification.

 

However, electronic evidence also faces challenges, such as alteration, deletion, corruption, tracing, locating, accessing, legal standards, rules, procedures, and technological changes.

 

Therefore, cyber forensics experts need to use tools, techniques, methods, and standards to collect, preserve, analyze, and present electronic evidence reliably and admissibly.

 

Some of these tools, techniques, and methods are:

 

- Forensic software, such as EnCase, FTK, Autopsy, etc. that can extract, recover, or analyze data from various sources and formats.

 

- Forensic hardware, such as write blockers, duplicators, imagers, etc. that can prevent or minimize the alteration or damage of the data during the acquisition process.

 

- Forensic procedures, such as chain of custody, documentation, verification, etc. that can ensure the integrity, authenticity, and continuity of the evidence from the crime scene to the court.

 

- Forensic standards, such as ISO, NIST, SWGDE, etc. that can provide guidelines, best practices.

 

Electronic evidence can help to solve, prevent, or deter cybercrimes and to protect the rights, interests, and security of the individuals, organizations, and society.

 

Reference:

 

forensicsciencesimplified.org

 

IACP

 

Cyfor.co

 


Comments ()


Sign in

Read Next

Modern Teaching Methods: Why Inquiry-based & Experiential Learning Works Best

Blog banner

Memory Management - operating system

Blog banner

1.1 basic elements

Blog banner

Koinex is shutting down and here is how you can withdraw...

Blog banner

The Role of cryptography in cyber security

Blog banner

Deadlock

Blog banner

Evolution of Operating System

Blog banner

My favourite food

Blog banner

Man VS Nature

Blog banner

What is OS Fingerprinting?

Blog banner

Is Brushing After Eating Damaging Your Teeth? (Fact or Myth)

Blog banner

Constrained Management in IT

Blog banner

This too shall pass

Blog banner

Binary Search Tree (BST) in Data Structure

Blog banner

Deadlock

Blog banner

Email Privacy

Blog banner

Top 5 Post-Wedding Skin Care Tips

Blog banner

Raid

Blog banner

What is Segmentation?

Blog banner

OPERATING SYSTEM

Blog banner

IT GOVERNANCE

Blog banner

Why Should You Schedule Tweets on Twitter?

Blog banner

Supervised and unsupervised learning

Blog banner

QUANTUM COMPUTING IN SECURITY:A GAME CHANGER IN DIGITAL WORLD

Blog banner

How Do I Get Rid of My People-Pleasing Behaviour?

Blog banner

How to use GIT & GITHUB

Blog banner

Types of OS

Blog banner

Im Photographer

Blog banner

HR Automation : Need of the hour

Blog banner

Memory management

Blog banner

INTRODUCTION TO C#

Blog banner

E-learning in today's world

Blog banner

Why Progressive Web Apps (PWAs) Are Replacing Traditional Websites

Blog banner

Threads in OS

Blog banner

FRIENDSHIP

Blog banner

SECURITY RISKS OF REMOTE WORKING

Blog banner

Denial-of-Service and Distributed Denial-of-Service Attack Techniques

Blog banner

Self defence

Blog banner

Interrupts - Types, Working & Importance

Blog banner

Should you be using a mouthwash? Know from the experts

Blog banner

Importance Of Time

Blog banner

Why Kanye West (Now Ye) is the GOAT: A Legacy Beyond Music

Blog banner