Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
9 views1 page

What Is Computer Forensics

Computer forensics is essential for managing digital evidence in solving cyber crimes and recovering compromised data. It involves various types of forensics, including database, email, mobile, memory, network, and malware forensics, each focusing on specific digital sources. Investigators collect, examine, and safeguard evidence to support legal and investigative processes.

Uploaded by

Kayathri K
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views1 page

What Is Computer Forensics

Computer forensics is essential for managing digital evidence in solving cyber crimes and recovering compromised data. It involves various types of forensics, including database, email, mobile, memory, network, and malware forensics, each focusing on specific digital sources. Investigators collect, examine, and safeguard evidence to support legal and investigative processes.

Uploaded by

Kayathri K
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1

What is computer forensics?

Computer forensics becomes more relevant daily as the world becomes increasingly digitally
connected. The management of digital evidence is critical for solving cyber crimes and
recovering important, compromised data. A computer forensics investigator's job is to collect,
examine, and safeguard this evidence.

Types of cyber forensics

Computer forensics always involves gathering and analyzing evidence from digital sources.
Some common types include:

 Database forensics: Retrieval and analysis of data or metadata found in databases

 Email forensics: Retrieval and analysis of messages, contacts, calendars, and other
information on an email platform

 Mobile forensics: Retrieval and analysis of data like messages, photos, videos, audio
files, and contacts from mobile devices

 Memory forensics: Retrieval and analysis of data stored on a computer's RAM (random
access memory) and/or cache

 Network forensics: Use of tools to monitor network traffic like intrusion detection
systems and firewalls

 Malware forensics: Analysis of code to identify malicious programs like viruses,


ransomware, or Trojan horses

You might also like