wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Electronic Evidence in Cyber Forensics

profile
16_Sahil Jaiswar
Jan 10, 2024
0 Likes
0 Discussions
109 Reads

Electronic evidence in cyber forensics is the process of collecting, preserving, analyzing, and presenting digital data that can be used to prove or disprove a cybercrime. 

 

Electronic evidence can be found in various devices, such as computers, smartphones, tablets, hard drives, flash drives, memory cards, CDs, DVDs, etc. 

 

Electronic evidence can also be stored in online platforms, such as email accounts, social media profiles, cloud services, etc.

 

Some examples of electronic evidence are:

 

- Files, folders, documents, images, videos, audio, etc. that are stored in a device or online.

 

- Metadata, such as file names, dates, sizes, locations, etc. that provide additional information about the data.

 

- Logs, such as browsing history, cookies, cache, etc. that record the user's online activities.

 

- Network data, such as IP addresses, MAC addresses, packets, etc. that identify the source and destination of the data transmission.

 

- Digital signatures, encryption, passwords, etc. that protect the data from unauthorized access or modification.

 

However, electronic evidence also faces challenges, such as alteration, deletion, corruption, tracing, locating, accessing, legal standards, rules, procedures, and technological changes.

 

Therefore, cyber forensics experts need to use tools, techniques, methods, and standards to collect, preserve, analyze, and present electronic evidence reliably and admissibly.

 

Some of these tools, techniques, and methods are:

 

- Forensic software, such as EnCase, FTK, Autopsy, etc. that can extract, recover, or analyze data from various sources and formats.

 

- Forensic hardware, such as write blockers, duplicators, imagers, etc. that can prevent or minimize the alteration or damage of the data during the acquisition process.

 

- Forensic procedures, such as chain of custody, documentation, verification, etc. that can ensure the integrity, authenticity, and continuity of the evidence from the crime scene to the court.

 

- Forensic standards, such as ISO, NIST, SWGDE, etc. that can provide guidelines, best practices.

 

Electronic evidence can help to solve, prevent, or deter cybercrimes and to protect the rights, interests, and security of the individuals, organizations, and society.

 

Reference:

 

forensicsciencesimplified.org

 

IACP

 

Cyfor.co

 


Comments ()


Sign in

Read Next

Importance Of Blockchain

Blog banner

Understanding Regression Analysis

Blog banner

Race Condition in Operating Theatre

Blog banner

Blockchain Transactions

Blog banner

Apple

Blog banner

Disk cache

Blog banner

Why we should do reading

Blog banner

Data Science in Predictive Analytics: Transforming Business Decision-Making

Blog banner

Mumbaicha Dabbawalla

Blog banner

Vulnerabilities in OnePlus Devices

Blog banner

How Sleep Impacts Learning and Behaviour for Toddlers?

Blog banner

Data Storytelling: Turning Analysis into Business Action

Blog banner

Blog on Smartsheet.

Blog banner

Evolution of operating systems

Blog banner

Modern operating system

Blog banner

Starvation

Blog banner

Virtual machine

Blog banner

What do you mean by online marketing and why do you need to know about it

Blog banner

QUANTUM COMPUTING IN SECURITY:A GAME CHANGER IN DIGITAL WORLD

Blog banner

What is OS and its overview

Blog banner

What is Influencer Marketing and its Trends

Blog banner

The Role of Frontline Managers in Driving Workplace Performance and Customer Satisfaction

Blog banner

File system implementation

Blog banner

Brilliant WhatsApp Features Upcoming in 2023

Blog banner

A-B-C of Networking: Part-1 (Basics)

Blog banner

File Allocation Methods

Blog banner

HTML vs HTML5

Blog banner

Biometric Authentication and Privacy: Balancing Ethical Concerns

Blog banner

10 Reasons why Monica and Chandler are the best couple ever.!!!

Blog banner

OS Assignment 3

Blog banner

ART AND CULTURE OF VRINDAVAN

Blog banner

What is metaverse?

Blog banner

Article on different management system

Blog banner

Interrupts

Blog banner

VPN

Blog banner

Operating Systems

Blog banner

Digital Footprints An Emerging Dimension of Digital Inequality

Blog banner

Music helps reduce stress

Blog banner

GIS Mapping

Blog banner

Concept and definition of m-commerce

Blog banner

How Do I Get Rid of My People-Pleasing Behaviour?

Blog banner

All you need to know about Cassandra

Blog banner