The Digital Of Digital Forensics

1586 Words7 Pages
With advances in digital technology, the scope of digital crimes has also increased multi-fold. Digital forensics is a science, which involves collection, preservation and documentation of the digital evidence from various digital storage media. This entire process must be undertaken in fashion that is appropriate forensically, and results in collection of data, which can be made admissible in a court of law during the investigation of a crime. Since most of the transactions today happen across digital media, it is imperative that organizations world over understand the fundamentals of forensics, and also take steps in training their employees. If such procedures are not put in place, then it may result in the data of an organization to…show more content…
The branch of Network forensics is relatively a newer branch of digital forensics, and it involves carefully analyzing the data that is flowing in a network to find any possible evidences of intrusion or theft. The information flow in a network is always dynamic in nature, and thus this branch of digital forensics needs to be proactive in its approach. One of the usage of this branch lies in the investigation of network data for any traffic that might seem anomalous in nature, for the purpose of detecting intrusions. The second usage lies in the area of law enforcement, where the evidence gathered by Network Forensics can be used as evidence in case of a crime. Mobile Device Forensics relates to data and evidence recovery from a mobile device, be it a mobile phone, PDA, tablet, GPS device, and so on. This area of forensics is a bit challenging due to the reason that exact pin pointing of location where from communication was initiated is not accurately possible. Other factors adding to the challenge are the diversity of manufacturers and models, multiple hardware and software specifications, and data recovery tools that may not bring the desired results on all platforms. Database Forensics specifically on the analysis of databases, using relevant tools for analysis and manipulation of data. Analysis of database meta-data is also undertaken, along with studying the
Get Access