z-logo
open-access-imgOpen Access
Qualitative Assessment of Digital Forensic Tools
Author(s) -
Sakshi Singh,
Suresh Kumar
Publication year - 2020
Publication title -
asian journal of managerial science/asian journal of managerial science
Language(s) - English
Resource type - Journals
eISSN - 2583-9810
pISSN - 2249-6300
DOI - 10.51983/ajes-2020.9.1.2372
Subject(s) - digital forensics , computer science , cybercrime , computer forensics , phishing , network forensics , hacker , forensic science , computer security , digital evidence , crime scene , forensic examination , data science , criminal investigation , world wide web , engineering , the internet , criminology , archaeology , forensic engineering , sociology , history
Forensic science is a study of science to criminals and civil laws. Digital forensics is the part of forensic science relating to proof found in computers and advanced storage media. Forensic examiners gather, protect and break down logical confirmations over the span of examination. Digital information contains data as content, pictures, sound, video and so on. These days numerous cybercrime cases, for example, hacking, banking cheats, phishing, email spamming, etc., have developed which are connected with a computerized information. Since the digital investigation is turning into an expanding concern, numerous digital forensic tools have been created to manage the difficulties of exploring computerized wrongdoings. The motivation behind digital forensics strategies is to look, protect and extract data on advanced frameworks to discover potential confirmations to exhibit them in the courtroom. In this paper, we have discussed five kinds of forensics namely Network Forensics, Live Forensics, Cyber Forensics, Database Forensics, and Mobile Forensics. The paper depicts a list of digital forensic tools in detail and looks at them based on the characterized parameters to figure out which tool suits better for any investigation. The paper looks at network, database and mobile forensic tools and examines the silent features and uniqueness of each of the tools along with their functionalities.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here