This paper is published in Volume-5, Issue-1, 2019
Area
Digital Forensics
Author
Nikunj Pansari
Co-authors
Dhruwal Kushwaha
Org/Univ
KIET Group of Institutions, Ghaziabad, Uttar Pradesh, India
Pub. Date
15 February, 2019
Paper ID
V5I1-1300
Publisher
Keywords
Cyber-attacks, Digital forensics, Data retrieval, Digital storage devices, Large-scale vulnerabilities

Citationsacebook

IEEE
Nikunj Pansari, Dhruwal Kushwaha. Forensic analysis and investigation using digital forensics- An overview, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARIIT.com.

APA
Nikunj Pansari, Dhruwal Kushwaha (2019). Forensic analysis and investigation using digital forensics- An overview. International Journal of Advance Research, Ideas and Innovations in Technology, 5(1) www.IJARIIT.com.

MLA
Nikunj Pansari, Dhruwal Kushwaha. "Forensic analysis and investigation using digital forensics- An overview." International Journal of Advance Research, Ideas and Innovations in Technology 5.1 (2019). www.IJARIIT.com.

Abstract

Using Digital forensics and its investigation techniques is a path towards the data retrieval and analysis of different kinds of digital storage devices. Various kinds of digital storage devices like a USB drive (pen drive), hard drive (mainly external), floppy disks, CDs and a few others also. It is a technique or method for extracting the lost or useful data from the storage media, when unavailable. Now, forensic analysis concept comes from Digital Forensics or it can be called as its sub-domain. Certain conditions of the storage devices will be considered like burnt, wet and damaged drives for data retrieval and analysis. Data is a prime concern for every organization or individual or so-called the main component of the architecture and working of the IT industries and thus, so its repercussions can’t be ignored. Companies spent almost thousands of dollars for maintaining the security of their enterprise data. Thus, the data protection and its retrieval after data theft(cyber-attacks) or loss is will help in evaluating out large-scale vulnerabilities.
Paper PDF