CYBER FORENSIC

Introduction

Computer forensics (sometimes known as computer forensic science) is a branch of digital forensic science pertaining to legal evidence found in computers and digital storage media. The goal of computer forensics is to examine digital media in a forensically sound manner with the aim of identifying, preserving, recovering, analyzing and presenting facts and opinions about the information.


Forensic process

Computer forensic investigations usually follow the standard digital forensic process

  • Acquisition
  • Analysis
  • Reporting


Techniques

A number of techniques are used during computer forensics investigations.

Cross-drive analysis
A forensic technique that correlates information found on multiple hard drives. The process, still being researched, can be used to identify social networks and for perform anomaly detection

Live analysis The examination of computers from within the operating system using custom forensics or existing sysadmin tools to extract evidence. The practice is useful when dealing with Encrypting File Systems, for example, where the encryption keys may be collected and, in some instances, the logical hard drive volume may be imaged (known as a live acquisition) before the computer is shut down.

Deleted files A common technique used in computer forensics is the recovery of deleted files. Modern forensic software have their own tools for recovering or carving out deleted data. Most operating systems and file systems do not always erase physical file data, allowing investigators to reconstruct it from the physical disk sectors. File carving involves searching for known file headers within the disk image and reconstructing deleted materials.



More Contents will be publishing soon





Subscribe Indian Cyber Security RSS feed


Enter your email address:



 


Facebook RSS

 

© Copyright-2010. All Rights Reserved.

This website is Accessible! We are proud to say, this website has ZERO detected "accessibility errors",
as per an accessibility evaluation conducted using WAVE, a highly reputable accessibility evaluation tool.

If you have any issue about publishing content of this site, then mail us to info@indiancybersecurity.com

Best View in CSS 3 Supportable Browsers and 1366x768 Resolution system.

Facebook