SlideShare a Scribd company logo
15
Most read
16
Most read
17
Most read
EXAMINING COMPUTER AND
EVIDENCE COLLECTION
DEFINITION
• "Computer forensics is the process of
identifying, holding, analyzing and presenting
digital evidence in a manner that is legally
acceptable." (Rodney Mckemmish 1999).
AIM OF COMPUTER FORENSICS
• The main aim of computer forensics experts is
not only to find the criminal, but also to
expose the evidence and the presentation of
the evidence in a way that leads to legal
action by the criminal.
PROPERTIES OF THE COMPUTER
FORENSIC
• IDENTIFY
• RECEIVE
• ANALYZE
• PRESENT
FORENSIC NEEDS OF THE COMPUTER
• To present evidence in court that could lead
• To the punishment of reality.
• To ensure the integrity of the computer
system.
HISTORY OF COMPUTER FORENSICS
• In the US, developments began over 30 years ago when
law enforcement and military investigators began to
view criminals as technical.
• In the decades that followed and until today the field
has exploded. Law enforcement and the military
continue to have strong local, state, and federal levels
of information security and computer forensics.
• Today software companies continue to make newer
and more robust forensic software. Law enforcement
and the military are increasingly identifying and
training personnel in responding to technology-related
crimes.
CYBER CRIME AND EVIDENCE
• CYBER CRIME
– Cyber ​​crime occurs when information technology is used to commit or hide a crime.
• TYPES OF CYBER CRIME
– Child Pornography
– Breach of Computer Security
– Fraud / Theft
– Copyright Infringement
– Identity Theft
– Drug Investigation
– Threat
– Burglary
– Suicide
– Obscenity
– Homicide
– Administrative Investigation
– Sexual Assault
– Stalking
• DIGITAL EVIDENCE
– “Any data recorded or stored on a medium in or
by a computer system or similar device that can
be read or understood by a person, computer
system or other similar device. It contains a
display, print or other output of this data.”
• latent as a fingerprint or fragile DNA
• can easily be changed, damaged or destroyed.
• Can be time sensitive
TYPES OF DIGITAL EVIDENCE
• PERSISTENT DATA, ie data that remains intact
when the computer is turned off. For example.
Hard drives, hard drives and removable media
(such as USB drives or flash drives).
• VOLATILE DATA, ie data that would be lost if
the computer were switched off. For example.
deleted files, computer history, computer
registry, temporary files and web browsing
history.
RULES OF EVIDENCE
• Admissible,
– Must be able to be used in court or elsewhere
• Authentic,
– The evidence relates to the incident in a relevant manner
• Complete (no tunnel vision),
– Excepted evidence for other suspects
• Reliable,
– None Question about authenticity and truthfulness
• Credible,
– Clear, easy to understand and credible by a jury.
TOP 10 EVIDENCE LOCATION
• Internet history files
• Temporary Internet files
• Free / unallocated space
• Friends lists, personal chat room records, P2P, other
saved areas
• Newsgroups / lists of number of clubs / publications
• Settings, folder structure, file names
• File storage data
• Software / Hardware added
• File sharing function
• Emails
COMPUTER METHODOLOGY
• Shut down the computer
• Document the system hardware configuration
• Move the computer system to a safe place
• Make bitstream backups of hard drives and floppy disks
• Check the data on all memories math devices
• Document the date and time of the system.
• List the search keywords
• Evaluate Windows swap file
• Evaluate file edge
• Evaluate unallocated storage space (deleted files)
• Find files, file edge and unallocated storage space for keywords
• Name, date and time of document files
• Identify file, Program and Memory Anomalies
• Assess program functionality.
• Document your results
COMPUTER APPLICATIONS
• APPLICATIONS
– FINANCIAL FRAUD DETECTION
– CRIMINAL PROCEEDINGS
– CIVIL DISPUTES
– "CORPORATE SECURITY POLICY AND ACCEPTANCE OF VIOLATIONS"
• Skills Required for Computer Forensic Applications
– Programming or computer experience
– Comprehensive understanding of operating systems and applications
– Strong analytical skills
– Strong basic computer skills
– Strong systems administration skills
– Knowledge of the latest intrusion tools
– Knowledge of cryptography and manipulation of evidence
– Ability to go to court To be an expert
Evidence collection
• Data collection plays an important role in identifying
and accessing data from various sources in the cloud
environment for forensic investigations. Evidence is no
longer stored on a single physical host and its data is
distributed in a different geographic area. So when a
crime occurs, it is very difficult to identify the evidence.
Evidence is gathered from various sources such as
routers, switches, servers, hosts, virtual machines,
browser artifacts and through internal storage media
such as hard drives, RAM images, storage physical, etc.
Evidence is also collected through log file analysis,
cloud storage data collection, web browser artifacts,
and physical storage analysis.
• Cloud log analysis
– Logging is considered a security check that can be
used to identify operational issues, incident violations,
and fraudulent activity. Logging is mainly used to
monitor the system and investigate various types of
malicious attacks. Using cloud log analysis, you can
identify the source of evidence generated at different
times by different devices such as routers, switches,
servers and VM instances, as well as other internal
components, namely hard drive, RAM images, physical
storage, log files, etc. Intervals. Information about
different types of attacks is stored in different log files
such as application logs, system logs, security logs,
configuration logs, network logs, web server logs, web
server logs, 'audit, VM logs, etc., which are specified
as follows:
– The application log is created by the developers by
inserting events into the program. System administrators
can use the application logs to determine the status of an
application running on the server.
– The system log contains information about the date and
time the log was created, the type of message such as
debugging, error, etc., the system generated messages
regarding the occurrence and the processes affected when
an event occurs. product.
– The firewall log contains information about source packets
routed, rejected IP addresses, outgoing internal server
activity, and connection failures.
– The network log contains detailed information about
various events on the network. Events include malicious
traffic logging, packet loss, bandwidth delays, etc. The
network administrator monitors and resolves daily activity
by analyzing network logs for various intrusion attempts.
– The web server log records entries for web pages executed on the web
server. Entries include the history of a page request, the client's IP
address, date and time, HTTP code, and bytes provided for the
request.
– The audit log records unauthorized access to the system or network in
sequential order. It helps security administrators analyze malicious
activity at the time of the attack. Information in audit log files includes
source and destination addresses, user credentials, and time stamps.
– The VM log records information specific to instances running on the
VM, such as: B. Startup configuration, operations, and the date the VM
instance finished running. It also logs the number of instances running
on the virtual machine, the execution time of each application, and
application migration to help the CSP locate malicious activity that
occurs during the attack.
– Due to the increasing use of network or new software version in the
cloud, the number of vulnerabilities or attacks in the cloud is
increasing and these attacks are reflected in various log files.
Application level attacks are reflected in different logs i.e. access log,
network protocol, authentication protocol, etc., and are also reflected
in different log file traces stored on Apache server . These logs are
used for forensic investigations to detect application-level attacks.
Capture evidence from cloud storage
• Evidence from cloud storage like Dropbox, Microsoft
SkyDrive, Google Drive, etc. are collected using the
web browser and files are downloaded using existing
software tools. This helps to identify illegal
modification or access to cloud storage while
uploading or uploading file contents to storage media
and to verify if attacker modifies timestamp
information in user accounts. The Virtual Forensic
Computing (VFC) tool is used by forensic investigators
to identify evidence from the virtual machine image
file. The proof is accessible for each account through
the web browser running in the cloud environment by
recording the encoded value of the VM image..
• Packets are captured using network packet tools like
Wireshark, Snappy, etc. from each VM instance running
on hosts. Account information is synchronized and
downloaded using client access software on each
device used to identify the source of evidence.
Evidence is isolated from files found in the virtual
machine using "C:  Users  [username]  Dropbox "
for Dropbox . The zip file contains the name of the
folder accessible through the browser to determine the
effect of a timestamp on a drive. If an attacker modifies
the contents of a file, the evidence is determined by
scanning the VM disk, the history of files stored in the
cloud and also from a cache. It can also be analyzed by
calculating the hash value of the VM image
• Collecting evidence via a web browser
– Clients communicate with the server in the cloud
environment using a web browser to perform
various tasks eg. Check emails and messages, shop
online, get information, etc. An important source
of evidence is web browser history. Evidence is
found by analyzing URLs in web browser history,
timeline analysis, user browsing behavior, and URL
encoding and retrieved from deleted information.
Here is a sample web browser URL
– Likewise, evidence stored in the web browser
cache in the root directory of a web application is
used to identify the source of an attack.
• Physical memory analysis
– This allows the caches to be available for use in
cloud computing which can be lost without
passive monitoring, eg B. Network socket,
encryption key and database information in
memory. They are scanned from the physical
dump using the pslist function, which retrieves
the process name, process ID, parent process IDs,
and process start time. The processes are
distinguished by the process names © exe © on
Windows and © sync © on Ubuntu and Mac OS.

More Related Content

PDF
A brief Intro to Digital Forensics
PPTX
Digital Evidence by Raghu Khimani
PPTX
Mobile Forensics
PDF
Extracting and Decoding Smartphone and Tablet Evidence with the UFED Series: ...
PPTX
Types of Cyber Crimes
PPTX
Digital forensic tools
PPTX
Cyber crime and its types
PPTX
Analysis of digital evidence
A brief Intro to Digital Forensics
Digital Evidence by Raghu Khimani
Mobile Forensics
Extracting and Decoding Smartphone and Tablet Evidence with the UFED Series: ...
Types of Cyber Crimes
Digital forensic tools
Cyber crime and its types
Analysis of digital evidence

What's hot (20)

PPTX
Cyber Security – Challenges [Autosaved].pptx
PDF
Cybercrime And Computer Misuse Cases
PPTX
Cybercrime investigation
PDF
National Cyber Security Policy 2013 (NCSP)
PPTX
Security audits & compliance
PPTX
Cyber Terrorism
PPT
Computer Forensic
PPT
Information security management
PPT
8. operations security
PDF
cyber space.pdf
PPT
Information Security
PPTX
Cyber Crime & Information technology Act 2000
PDF
Ceh v5 module 10 session hijacking
PPTX
INTERPOL
PPTX
Cybercrime Mobile and Wireless Devices.pptx
PDF
Incident response methodology
PPTX
Cyber forensic-Evedidence collection tools
PPTX
Computer forensic ppt
PPT
Preserving and recovering digital evidence
PPTX
Cyber crime
Cyber Security – Challenges [Autosaved].pptx
Cybercrime And Computer Misuse Cases
Cybercrime investigation
National Cyber Security Policy 2013 (NCSP)
Security audits & compliance
Cyber Terrorism
Computer Forensic
Information security management
8. operations security
cyber space.pdf
Information Security
Cyber Crime & Information technology Act 2000
Ceh v5 module 10 session hijacking
INTERPOL
Cybercrime Mobile and Wireless Devices.pptx
Incident response methodology
Cyber forensic-Evedidence collection tools
Computer forensic ppt
Preserving and recovering digital evidence
Cyber crime
Ad

Similar to Examining computer and evidence collection (20)

PPTX
computer-forensics-8727-OHvDvOm.pptx
PPTX
computer-forensics-8727-OHvDvOm.pptx
PPTX
PPTX
Digital&computforensic
PPTX
Akcomputerforensics 130222081008-phpapp02-140809110602-phpapp02
PPTX
Computer Forensics
PPTX
Computer forensics ppt
PDF
computerforensicsppt-111006063922-phpapp01.pdf
PPTX
cyberforensicsv2-191113184409.pptx
PPTX
computer forensics
PPTX
Computer Forensics
PDF
Daniel_CISSP_Dom7__1_.pdf
PPTX
computer forensics by amritanshu kaushik
PPT
Introduction to computer forensic
PPTX
INTRODUCTION TO CYBERFORENSICS AND ITS APPLICATION IN CYBERSECURITY
PPT
Secure Computer Forensics and its tools
PPTX
Business Intelligence (BI) Tools For Computer Forensic
PPTX
Cyber Forensics Overview
PPTX
Digital Forensic ppt
PPTX
Computer forensics
computer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptx
Digital&computforensic
Akcomputerforensics 130222081008-phpapp02-140809110602-phpapp02
Computer Forensics
Computer forensics ppt
computerforensicsppt-111006063922-phpapp01.pdf
cyberforensicsv2-191113184409.pptx
computer forensics
Computer Forensics
Daniel_CISSP_Dom7__1_.pdf
computer forensics by amritanshu kaushik
Introduction to computer forensic
INTRODUCTION TO CYBERFORENSICS AND ITS APPLICATION IN CYBERSECURITY
Secure Computer Forensics and its tools
Business Intelligence (BI) Tools For Computer Forensic
Cyber Forensics Overview
Digital Forensic ppt
Computer forensics
Ad

More from gagan deep (20)

PPTX
Transnational organized crime its concept
PPTX
Theories of justice
PPTX
The salient features of prevention of terrorism act, 2002
PPTX
The election of judges of international criminal court
PPTX
Summaries the article competence of two judge benches of supreme court to ref...
PPTX
Specific crimes under icc
PPTX
Spamming as cyber crime
PPTX
Principle of complementarity
PPTX
Precedents concept and kinds
PPTX
Law and legitimacy
PPTX
Internal aids of interpretation and construction of statutes
PPTX
Fiscal technique
PPTX
Drug trafficking and the role of ndps act in curbing the menace of organized ...
PPTX
Difference between legal logic and legal rhetoric
PPTX
Cyberspace jurisdiction meaning and concept
PPTX
Vicarious liability under criminal law
PPTX
Type of research method are used
PPTX
Trial process in uk
PPTX
Rights of accused persons criminal law
PPTX
research Qualitative vs. quantitative research
Transnational organized crime its concept
Theories of justice
The salient features of prevention of terrorism act, 2002
The election of judges of international criminal court
Summaries the article competence of two judge benches of supreme court to ref...
Specific crimes under icc
Spamming as cyber crime
Principle of complementarity
Precedents concept and kinds
Law and legitimacy
Internal aids of interpretation and construction of statutes
Fiscal technique
Drug trafficking and the role of ndps act in curbing the menace of organized ...
Difference between legal logic and legal rhetoric
Cyberspace jurisdiction meaning and concept
Vicarious liability under criminal law
Type of research method are used
Trial process in uk
Rights of accused persons criminal law
research Qualitative vs. quantitative research

Recently uploaded (20)

PPTX
Philippine Politics and Governance - Lesson 10 - The Executive Branch
PPTX
kabarak lecture 2.pptx on development of family law in kenya
PPTX
Indian Medical Device Rules or Institute of Management Development and Research
PPTX
Classifying Different Branches of Law.pptx
PPTX
DepEd 4A Gender Issues and Promoting Gender Equality.pptx
PDF
Legal & Ethical Dilemma of Obstetric & Gynaecological Practice In The Gambia ...
PPTX
Indian Medical Device Rules or Institute of Management Development and Research.
PPT
Gender sensitivity and fair language implementation
PDF
Insolvency and Bankruptcy Amendment Bill 2025
PDF
Palghar-286Nilemore-VoterList-Aug25-1.pdf
PPTX
Court PROCESS Notes_Law Clinic Notes.pptx
PDF
Palghar-SGupta-ScreesnShots-12Aug25.pdf The image of the voter list with phot...
PPTX
BL 2 - Courts and Alternative Dispute Resolution.pptx
PDF
NRL_Legal Regulation of Forests and Wildlife.pdf
PDF
2022CH12581 - Civil Rights vs Morzak, Harrison, Chrisman et al. (Cook County,...
PDF
OBLICON (Civil Law of the Philippines) Obligations and Contracts
PPTX
lecture 5.pptx on family law notes well detailed
PPTX
R.A. NO. 76 10 OR THE CHILD ABUSE LAW.pptx
PPTX
Constitutional Law 2 Final Report.ppt bill of rights in under the constitution
PDF
250811-FINAL-Bihar_Voter_Deletion_Analysis_Presentation.pdf
Philippine Politics and Governance - Lesson 10 - The Executive Branch
kabarak lecture 2.pptx on development of family law in kenya
Indian Medical Device Rules or Institute of Management Development and Research
Classifying Different Branches of Law.pptx
DepEd 4A Gender Issues and Promoting Gender Equality.pptx
Legal & Ethical Dilemma of Obstetric & Gynaecological Practice In The Gambia ...
Indian Medical Device Rules or Institute of Management Development and Research.
Gender sensitivity and fair language implementation
Insolvency and Bankruptcy Amendment Bill 2025
Palghar-286Nilemore-VoterList-Aug25-1.pdf
Court PROCESS Notes_Law Clinic Notes.pptx
Palghar-SGupta-ScreesnShots-12Aug25.pdf The image of the voter list with phot...
BL 2 - Courts and Alternative Dispute Resolution.pptx
NRL_Legal Regulation of Forests and Wildlife.pdf
2022CH12581 - Civil Rights vs Morzak, Harrison, Chrisman et al. (Cook County,...
OBLICON (Civil Law of the Philippines) Obligations and Contracts
lecture 5.pptx on family law notes well detailed
R.A. NO. 76 10 OR THE CHILD ABUSE LAW.pptx
Constitutional Law 2 Final Report.ppt bill of rights in under the constitution
250811-FINAL-Bihar_Voter_Deletion_Analysis_Presentation.pdf

Examining computer and evidence collection

  • 2. DEFINITION • "Computer forensics is the process of identifying, holding, analyzing and presenting digital evidence in a manner that is legally acceptable." (Rodney Mckemmish 1999).
  • 3. AIM OF COMPUTER FORENSICS • The main aim of computer forensics experts is not only to find the criminal, but also to expose the evidence and the presentation of the evidence in a way that leads to legal action by the criminal.
  • 4. PROPERTIES OF THE COMPUTER FORENSIC • IDENTIFY • RECEIVE • ANALYZE • PRESENT
  • 5. FORENSIC NEEDS OF THE COMPUTER • To present evidence in court that could lead • To the punishment of reality. • To ensure the integrity of the computer system.
  • 6. HISTORY OF COMPUTER FORENSICS • In the US, developments began over 30 years ago when law enforcement and military investigators began to view criminals as technical. • In the decades that followed and until today the field has exploded. Law enforcement and the military continue to have strong local, state, and federal levels of information security and computer forensics. • Today software companies continue to make newer and more robust forensic software. Law enforcement and the military are increasingly identifying and training personnel in responding to technology-related crimes.
  • 7. CYBER CRIME AND EVIDENCE • CYBER CRIME – Cyber ​​crime occurs when information technology is used to commit or hide a crime. • TYPES OF CYBER CRIME – Child Pornography – Breach of Computer Security – Fraud / Theft – Copyright Infringement – Identity Theft – Drug Investigation – Threat – Burglary – Suicide – Obscenity – Homicide – Administrative Investigation – Sexual Assault – Stalking
  • 8. • DIGITAL EVIDENCE – “Any data recorded or stored on a medium in or by a computer system or similar device that can be read or understood by a person, computer system or other similar device. It contains a display, print or other output of this data.” • latent as a fingerprint or fragile DNA • can easily be changed, damaged or destroyed. • Can be time sensitive
  • 9. TYPES OF DIGITAL EVIDENCE • PERSISTENT DATA, ie data that remains intact when the computer is turned off. For example. Hard drives, hard drives and removable media (such as USB drives or flash drives). • VOLATILE DATA, ie data that would be lost if the computer were switched off. For example. deleted files, computer history, computer registry, temporary files and web browsing history.
  • 10. RULES OF EVIDENCE • Admissible, – Must be able to be used in court or elsewhere • Authentic, – The evidence relates to the incident in a relevant manner • Complete (no tunnel vision), – Excepted evidence for other suspects • Reliable, – None Question about authenticity and truthfulness • Credible, – Clear, easy to understand and credible by a jury.
  • 11. TOP 10 EVIDENCE LOCATION • Internet history files • Temporary Internet files • Free / unallocated space • Friends lists, personal chat room records, P2P, other saved areas • Newsgroups / lists of number of clubs / publications • Settings, folder structure, file names • File storage data • Software / Hardware added • File sharing function • Emails
  • 12. COMPUTER METHODOLOGY • Shut down the computer • Document the system hardware configuration • Move the computer system to a safe place • Make bitstream backups of hard drives and floppy disks • Check the data on all memories math devices • Document the date and time of the system. • List the search keywords • Evaluate Windows swap file • Evaluate file edge • Evaluate unallocated storage space (deleted files) • Find files, file edge and unallocated storage space for keywords • Name, date and time of document files • Identify file, Program and Memory Anomalies • Assess program functionality. • Document your results
  • 13. COMPUTER APPLICATIONS • APPLICATIONS – FINANCIAL FRAUD DETECTION – CRIMINAL PROCEEDINGS – CIVIL DISPUTES – "CORPORATE SECURITY POLICY AND ACCEPTANCE OF VIOLATIONS" • Skills Required for Computer Forensic Applications – Programming or computer experience – Comprehensive understanding of operating systems and applications – Strong analytical skills – Strong basic computer skills – Strong systems administration skills – Knowledge of the latest intrusion tools – Knowledge of cryptography and manipulation of evidence – Ability to go to court To be an expert
  • 14. Evidence collection • Data collection plays an important role in identifying and accessing data from various sources in the cloud environment for forensic investigations. Evidence is no longer stored on a single physical host and its data is distributed in a different geographic area. So when a crime occurs, it is very difficult to identify the evidence. Evidence is gathered from various sources such as routers, switches, servers, hosts, virtual machines, browser artifacts and through internal storage media such as hard drives, RAM images, storage physical, etc. Evidence is also collected through log file analysis, cloud storage data collection, web browser artifacts, and physical storage analysis.
  • 15. • Cloud log analysis – Logging is considered a security check that can be used to identify operational issues, incident violations, and fraudulent activity. Logging is mainly used to monitor the system and investigate various types of malicious attacks. Using cloud log analysis, you can identify the source of evidence generated at different times by different devices such as routers, switches, servers and VM instances, as well as other internal components, namely hard drive, RAM images, physical storage, log files, etc. Intervals. Information about different types of attacks is stored in different log files such as application logs, system logs, security logs, configuration logs, network logs, web server logs, web server logs, 'audit, VM logs, etc., which are specified as follows:
  • 16. – The application log is created by the developers by inserting events into the program. System administrators can use the application logs to determine the status of an application running on the server. – The system log contains information about the date and time the log was created, the type of message such as debugging, error, etc., the system generated messages regarding the occurrence and the processes affected when an event occurs. product. – The firewall log contains information about source packets routed, rejected IP addresses, outgoing internal server activity, and connection failures. – The network log contains detailed information about various events on the network. Events include malicious traffic logging, packet loss, bandwidth delays, etc. The network administrator monitors and resolves daily activity by analyzing network logs for various intrusion attempts.
  • 17. – The web server log records entries for web pages executed on the web server. Entries include the history of a page request, the client's IP address, date and time, HTTP code, and bytes provided for the request. – The audit log records unauthorized access to the system or network in sequential order. It helps security administrators analyze malicious activity at the time of the attack. Information in audit log files includes source and destination addresses, user credentials, and time stamps. – The VM log records information specific to instances running on the VM, such as: B. Startup configuration, operations, and the date the VM instance finished running. It also logs the number of instances running on the virtual machine, the execution time of each application, and application migration to help the CSP locate malicious activity that occurs during the attack. – Due to the increasing use of network or new software version in the cloud, the number of vulnerabilities or attacks in the cloud is increasing and these attacks are reflected in various log files. Application level attacks are reflected in different logs i.e. access log, network protocol, authentication protocol, etc., and are also reflected in different log file traces stored on Apache server . These logs are used for forensic investigations to detect application-level attacks.
  • 18. Capture evidence from cloud storage • Evidence from cloud storage like Dropbox, Microsoft SkyDrive, Google Drive, etc. are collected using the web browser and files are downloaded using existing software tools. This helps to identify illegal modification or access to cloud storage while uploading or uploading file contents to storage media and to verify if attacker modifies timestamp information in user accounts. The Virtual Forensic Computing (VFC) tool is used by forensic investigators to identify evidence from the virtual machine image file. The proof is accessible for each account through the web browser running in the cloud environment by recording the encoded value of the VM image..
  • 19. • Packets are captured using network packet tools like Wireshark, Snappy, etc. from each VM instance running on hosts. Account information is synchronized and downloaded using client access software on each device used to identify the source of evidence. Evidence is isolated from files found in the virtual machine using "C: Users [username] Dropbox " for Dropbox . The zip file contains the name of the folder accessible through the browser to determine the effect of a timestamp on a drive. If an attacker modifies the contents of a file, the evidence is determined by scanning the VM disk, the history of files stored in the cloud and also from a cache. It can also be analyzed by calculating the hash value of the VM image
  • 20. • Collecting evidence via a web browser – Clients communicate with the server in the cloud environment using a web browser to perform various tasks eg. Check emails and messages, shop online, get information, etc. An important source of evidence is web browser history. Evidence is found by analyzing URLs in web browser history, timeline analysis, user browsing behavior, and URL encoding and retrieved from deleted information. Here is a sample web browser URL – Likewise, evidence stored in the web browser cache in the root directory of a web application is used to identify the source of an attack.
  • 21. • Physical memory analysis – This allows the caches to be available for use in cloud computing which can be lost without passive monitoring, eg B. Network socket, encryption key and database information in memory. They are scanned from the physical dump using the pslist function, which retrieves the process name, process ID, parent process IDs, and process start time. The processes are distinguished by the process names © exe © on Windows and © sync © on Ubuntu and Mac OS.