wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Electronic Evidence in Cyber Forensics

profile
16_Sahil Jaiswar
Jan 10, 2024
0 Likes
0 Discussions
109 Reads

Electronic evidence in cyber forensics is the process of collecting, preserving, analyzing, and presenting digital data that can be used to prove or disprove a cybercrime. 

 

Electronic evidence can be found in various devices, such as computers, smartphones, tablets, hard drives, flash drives, memory cards, CDs, DVDs, etc. 

 

Electronic evidence can also be stored in online platforms, such as email accounts, social media profiles, cloud services, etc.

 

Some examples of electronic evidence are:

 

- Files, folders, documents, images, videos, audio, etc. that are stored in a device or online.

 

- Metadata, such as file names, dates, sizes, locations, etc. that provide additional information about the data.

 

- Logs, such as browsing history, cookies, cache, etc. that record the user's online activities.

 

- Network data, such as IP addresses, MAC addresses, packets, etc. that identify the source and destination of the data transmission.

 

- Digital signatures, encryption, passwords, etc. that protect the data from unauthorized access or modification.

 

However, electronic evidence also faces challenges, such as alteration, deletion, corruption, tracing, locating, accessing, legal standards, rules, procedures, and technological changes.

 

Therefore, cyber forensics experts need to use tools, techniques, methods, and standards to collect, preserve, analyze, and present electronic evidence reliably and admissibly.

 

Some of these tools, techniques, and methods are:

 

- Forensic software, such as EnCase, FTK, Autopsy, etc. that can extract, recover, or analyze data from various sources and formats.

 

- Forensic hardware, such as write blockers, duplicators, imagers, etc. that can prevent or minimize the alteration or damage of the data during the acquisition process.

 

- Forensic procedures, such as chain of custody, documentation, verification, etc. that can ensure the integrity, authenticity, and continuity of the evidence from the crime scene to the court.

 

- Forensic standards, such as ISO, NIST, SWGDE, etc. that can provide guidelines, best practices.

 

Electronic evidence can help to solve, prevent, or deter cybercrimes and to protect the rights, interests, and security of the individuals, organizations, and society.

 

Reference:

 

forensicsciencesimplified.org

 

IACP

 

Cyfor.co

 


Comments ()


Sign in

Read Next

What makes Nugget RC Racing Florida’s Most Exciting Racing Events?

Blog banner

Types of Malware in Cyber Security

Blog banner

Pipedrive

Blog banner

THE LEGAL ISSUES OF COMPUTER FORENSICS IN INDIA

Blog banner

Different Types of Data

Blog banner

GIS Bharat Maps

Blog banner

Safeguarding Your Data: The Importance of Wireless Encryption

Blog banner

MEMORY MANAGEMENT FILE

Blog banner

Privacy in Social Media and Online Services

Blog banner

Deadlock Prevention

Blog banner

Evolution of the Microprocessor ~ Aditya Pai

Blog banner

THREADS (assignment 1)

Blog banner

How Social Media Algorithms Will Work in 2026?

Blog banner

WomenEmpowerment

Blog banner

Friendship

Blog banner

Fitness regime by Deepesh

Blog banner

Working with Sniffers for monitoring network communication

Blog banner

Importance of education

Blog banner

Data Science in Healthcare: Predicting Diseases

Blog banner

Child labour

Blog banner

Decoding Confusion Matrix

Blog banner

Jira Software

Blog banner

ASANA- A Management System.

Blog banner

Data Science in Everyday Life (like a phone, shopping cart, or social media icons)

Blog banner

What is a Malware ?

Blog banner

Stay Close To Adventure In Arcadia, Florida At Oak Tree Hotel

Blog banner

How to use open SSL for web server - browser communication

Blog banner

Texting is actually better than talking in person

Blog banner

Python as a tool for Data science task & project

Blog banner

MODERN OPERATING SYSTEM

Blog banner

CoWIN

Blog banner

INTERNET SECURITY

Blog banner

Types of email

Blog banner

Virtual memory in os

Blog banner

Explain Kernel in OS

Blog banner

“Shot on iPhone” : A campaign by Apple that turned into a prodigy

Blog banner

Multiprocessor and scheduling

Blog banner

Dos (Denial of service) Attack

Blog banner

Vulnerabilities in OnePlus Devices

Blog banner

Types of Viruses

Blog banner

Music

Blog banner

Importance of self defence for girls

Blog banner