Abstract

Digital forensics is regarded as the most intricate part of the cyber crime investigation process. It is often where the strongest evidence can come from. It is the scientific acquisition, analysis, and preservation of data contained in electronic media whose information can be used as evidence in a court of law. Traditional digital forensics started with the seizure of a computer or some media. The drives and media were duplicated in a forensically sound manner bit by bit. The forensic practitioner essentially undeleted files, searched for temporary files, recovered e-mail, and performed other functions to try and find the evidence contained on the media. However, nowadays there are more user-friendly programs available that present data in a graphical user interface (GUI), and automate much of the extremely technical work that used to require in-depth knowledge and expertise with a hex editor.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.