Skip to main content

What is Digital Forensics & Types of Digital Forensics



What is Digital Forensics?


Digital Forensics is defined as the process of preservation, identification, extraction, and documentation of computer evidence which can be used by the court of law. It is a science of finding evidence from digital media like a computer, mobile phone, server, or network. It provides the forensic team with the best techniques and tools to solve complicated digital-related cases.Digital Forensics helps the forensic team to analyzes, inspect, identifies, and preserve the digital evidence residing on various types of electronic devices.

Objectives of Computer Forensics.

  • It helps to recover, analyze, and preserve computer and related materials in such a manner that it helps the investigation agency to present them as evidence in a court of law.
  • It helps to postulate the motive behind the crime and identity of the main culprit.
  • Designing procedures at a suspected crime scene which helps you to ensure that the digital evidence obtained is not corrupted.
  • Data acquisition and duplication: Recovering deleted files and deleted partitions from digital media to extract the evidence and validate them.
  • Helps you to identify the evidence quickly, and also allows you to estimate the potential impact of the malicious activity on the victim
  • Producing a computer forensic report which offers a complete report on the investigation process.
  • Preserving the evidence by following the chain of custody.

Process of Digital Forensics.

  • Identification
  • Preservation
  • Extraction
  • Interpretation
  • Documentation
  • Presentation       

Types of Digital Forensics.

Various types of Computer Forensics | Download Scientific Diagram

  • Computer Forensics
  • Disc Forensics
  • Wireless Forensics
  • Network Forensics
  • Database Forensics
  • Forensics Data Analysis
  • Mobile Device Forensics
  • IOT Forensics
  • Cloud Forensics

Challenges faced in Digital Forensics.
  • The increase of PC's and extensive use of internet access
  • Easy availability of hacking tools
  • Lack of physical evidence makes prosecution difficult.
  • The large amount of storage space into Terabytes that makes this investigation job difficult.
  • Any technological changes require an upgrade or changes to solutions.

Advantages of Digital forensics.

  • To ensure the integrity of the computer system.
  • To produce evidence in the court, which can lead to the punishment of the culprit.
  • Efficiently tracks down cyber criminals from anywhere in the world.
  • Helps to protect the organization's money and valuable time.

Disadvantages of Digital Forensics.

  • Digital evidence accepted into court. However, it is must be proved that there is no tampering
  • Producing electronic records and storing them is an extremely costly affair
  • Legal practitioners must have extensive computer knowledge
  • Need to produce authentic and convincing evidence
     

Comments

Popular posts from this blog

What is Armitage and how is it used.

  What is Armitage? Armitage is a graphical user interface for the Metasploit Framework. At first glance, it may seem that Armitage is just a pretty front-end on top of Metasploit. That’s not quite true. Armitage is a scriptable red team collaboration tool. It has a server component to allow a team of hackers to share their accesses to compromised hosts. Starting Kali Linux The best way to start playing with Armitage is to download Kali Linux and run it in a virtual machine. For this guide, you should set your virtual machine to NAT networking. This is necessary because in a moment, I will ask you to download a target virtual machine and set it up. To login to Kali Linux, use the username  root , password  toor . To request an IP address via DHCP, type  dhclient . To start X Windows, type  startx . Use Java 1.7 Kali Linux ships with Java 1.6 and Java 1.7. Java 1.6 is the default though and for some people–this version of Java makes their menu...

The Internet of Things is not a concept; it is a network, the true technology-enabled Network of all network . We need to get smarter about hardware and software innovation in order to get the most value from the emerging Internet of Things.

 INTERNET OF THINGS        Embedded System :- Definition:- • An  Embedded System  is one that has computer hardware with software  embedded in it as one of its important components. • An embedded system is a  special-purpose  computer system designed to  perform one or a few dedicated / Specific functions • It is a system whose  principle function  is not computational, but which is  controlled by a computer embedded within it • An embedded system is any device that includes a  programmable computer  but is not itself a general-purpose computer. • An  application specific  electronic sub-system which is completely    encapsulated by the main system it belongs to.   Components of Embedded System :- •  CPU ( Microcontroller ) •  Software ( Embedded software ) •  Memory ( RAM , ROM ) •  FPGA / ASIC •  Sensors ( Temperature...

The Value Of TIME

  Life Lesson: "Time really is precious, so be careful where you spend it." Time is a very precious thing in our life. Time is something we should never waste in any way. We can spend a lot of time doing various works, but we can never get back the time we spent. That’s why most of the successful people consider time as more important and valuable than money. We all should utilize our time in productive ways. If you master the technique of managing time to utilize your time efficiency, you can achieve anything in your life. Time helps you to attain more with lesser efforts. It is always better to respect and follow the valuable time instead of regretting later as the time we have spent is never coming back. We all know about the proverb “Time and Tide wait for none,” It is apt for our life. We all should think that the time we get is an opportunity to grab for a well-built future. We should teach our younger ones also about the value of time. Utilizing time for our loved ones...