wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Electronic Evidence in Cyber Forensics

profile
16_Sahil Jaiswar
Jan 10, 2024
0 Likes
0 Discussions
109 Reads

Electronic evidence in cyber forensics is the process of collecting, preserving, analyzing, and presenting digital data that can be used to prove or disprove a cybercrime. 

 

Electronic evidence can be found in various devices, such as computers, smartphones, tablets, hard drives, flash drives, memory cards, CDs, DVDs, etc. 

 

Electronic evidence can also be stored in online platforms, such as email accounts, social media profiles, cloud services, etc.

 

Some examples of electronic evidence are:

 

- Files, folders, documents, images, videos, audio, etc. that are stored in a device or online.

 

- Metadata, such as file names, dates, sizes, locations, etc. that provide additional information about the data.

 

- Logs, such as browsing history, cookies, cache, etc. that record the user's online activities.

 

- Network data, such as IP addresses, MAC addresses, packets, etc. that identify the source and destination of the data transmission.

 

- Digital signatures, encryption, passwords, etc. that protect the data from unauthorized access or modification.

 

However, electronic evidence also faces challenges, such as alteration, deletion, corruption, tracing, locating, accessing, legal standards, rules, procedures, and technological changes.

 

Therefore, cyber forensics experts need to use tools, techniques, methods, and standards to collect, preserve, analyze, and present electronic evidence reliably and admissibly.

 

Some of these tools, techniques, and methods are:

 

- Forensic software, such as EnCase, FTK, Autopsy, etc. that can extract, recover, or analyze data from various sources and formats.

 

- Forensic hardware, such as write blockers, duplicators, imagers, etc. that can prevent or minimize the alteration or damage of the data during the acquisition process.

 

- Forensic procedures, such as chain of custody, documentation, verification, etc. that can ensure the integrity, authenticity, and continuity of the evidence from the crime scene to the court.

 

- Forensic standards, such as ISO, NIST, SWGDE, etc. that can provide guidelines, best practices.

 

Electronic evidence can help to solve, prevent, or deter cybercrimes and to protect the rights, interests, and security of the individuals, organizations, and society.

 

Reference:

 

forensicsciencesimplified.org

 

IACP

 

Cyfor.co

 


Comments ()


Sign in

Read Next

I Personally

Blog banner

Memory Management

Blog banner

How To Secure Operating Systems ?

Blog banner

Data carving - using hex editor

Blog banner

Pilgrimage at LOC: A privilege and a paradox

Blog banner

Device driver

Blog banner

Understanding Univariate, Bivariate, and Multivariate Analysis in Data Science

Blog banner

The role of artificial intelligence in automating digital forensic analysis.

Blog banner

Memory Management

Blog banner

VIRTUAL MACHINES

Blog banner

Memory Management

Blog banner

Mumbai

Blog banner

Operating system

Blog banner

Deadlock in operating system

Blog banner

Deadlocks in Operating Systems

Blog banner

Memory Management in an Operating System

Blog banner

The Role of Data Provenance and Lineage in Modern Data Science

Blog banner

Evolution of operating system

Blog banner

To-Do List In LISP

Blog banner

EVOLUTION OF THE MIRCOPROCESSOR

Blog banner

Data Visualization – Importance and tools (Tableau, Power BI)

Blog banner

Severe landslides continue to cause concern in Joshimath, Uttarakhand

Blog banner

FREE VERSION OF G-MAIL

Blog banner

1.1 basic elements

Blog banner

Dos (Denial of service) Attack

Blog banner

Virus

Blog banner

Microsoft Windows Overview

Blog banner

Emotional Intelligence in Children: Why It Is as Important as Academics

Blog banner

Music helps reduce stress

Blog banner

Embedded Operating System

Blog banner

differentiate thinking humanly and rationally

Blog banner

E-security systems | CCTV

Blog banner

Different types of scam Fraud

Blog banner

Atlantis - The Lost Island.........

Blog banner

GIS in Mapping and landslide alert in Bangladesh

Blog banner

Security issues

Blog banner

Memory Management

Blog banner

File Systems in OS.

Blog banner

Balance

Blog banner

Concurrency and memory

Blog banner

Benefits of yoga and meditation

Blog banner

Is Social Media Marketing The Next Wave Of Digital Marketing?

Blog banner