Abstract

As the dependence on digital information and the Internet continues to grow, it changes the way of computer crime. The number of computer crimes increases dramatically in recent years and investigators have been facing the difficulty of admissibility of digital evidence. To solve this problem, we must collect evidence by digital forensics techniques and analyze the digital data or recover the damaged data. One place to collect evidence is from application software. This paper seeks to find out how to collect, store and analyze application information for forensic purposes. This is also to determine gaps in current research works and proffer recommendations on what future works relate to application forensics. Keywords: Digital Forensics, Evidence, Application Information, Analysis, Registered Host BOOK Chapter ǀ Research Nexus in IT, Law, Cyber Security & Forensics. Open Access. Distributed Free Citation: Rosemond O. Addo-Sampong (2022): Application Information for Forensic Analysis (Considerations for Registered Host / Users / Device Name & Bearer Tokens) Book Chapter Series on Research Nexus in IT, Law, Cyber Security & Forensics. Pp 167-172 www.isteams.net/ITlawbookchapter2022. dx.doi.org/10.22624/AIMS/CRP-BK3-P27

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call