Select Page

Computer forensic

Computer forensic investigations usually follow the standard digital forensic process or phases which are acquisition, examination, analysis and reporting. Investigations are performed on static data (i.e. acquired images) rather than “live” systems. This is a change from early forensic practices where a lack of specialist tools led to investigators commonly working on live data.

Techniques:

Cross Drive Analysis

Live Analysis

Deleted files

Stochastic

Steganography

A number of open source and commercial tools exist for computer forensics investigation. Typical forensic analysis includes a manual review of material on the media, reviewing the Windows registry for suspect information, discovering and cracking passwords, keyword searches for topics related to the crime, and extracting e-mail and pictures for review

The goal of Computer Forensics is to perform a structured investigation while maintaining a documented chain of evidence to find out exactly what happened on a computer and who was responsible for it

Computer Forensic , also called as Cyber Forensic, is the application of computer investigation and analysis techniques to gather evidence suitable for presentation in a court of law

Computer forensic Components:

Assessment

Acquisition

Authentication

Analysis

Articulation

Pin It on Pinterest

Share This

*DISCLAIMER BEFORE ACCESSING THE WEBSITE

The information contained in this website is for general information purposes only. The information is provided by Cyber Law Solution and while we endeavour to keep the information up to date and correct, we make no representations or warranties of any kind, express or implied, about the completeness, accuracy, reliability, suitability or availability with respect to the website or the information, products, services, or related graphics contained on the website for any purpose. Any reliance you place on such information is therefore strictly at your own risk.