Introduction: Computer forensics is the exercise of collecting, analysing and reporting on digital records in a way that is legally admissible. It can be used in the detection and prevention of crime and in any dispute the place proof is saved digitally. Computer forensics has similar examination degrees to different forensic disciplines and faces comparable issues.
About this guide: This information discusses laptop forensics from a impartial perspective. It is now not linked to specific rules or meant to promote a precise organization or product and is now not written in bias of both regulation enforcement or business laptop forensics. It is aimed at a non-technical target market and offers a high-level view of laptop forensics. This information makes use of the time period “computer”, however the ideas follow to any gadget successful of storing digital information. Where methodologies have been referred to they are furnished as examples solely and do no longer represent suggestions or advice. Copying and publishing the complete or phase of this article is licensed entirely beneath the phrases of the Creative Commons – Attribution Non-Commercial three license
Uses of laptop forensics: There are few areas of crime or dispute the place pc forensics can’t be applied. Law enforcement organizations have been amongst the earliest and heaviest customers of pc forensics and hence have frequently been at the forefront of tendencies in the field. Computers may additionally represent a ‘scene of a crime’, for instance with hacking [ 1] or denial of carrier assaults  or they may additionally keep proof in the shape of emails, net history, archives or different documents applicable to crimes such as murder, kidnap, fraud and drug trafficking. It is now not simply the content material of emails, files and different archives which may additionally be of activity to investigators however additionally the ‘meta-data’  related with these files. A pc forensic examination may also disclose when a report first seemed on a computer, when it used to be final edited, when it was once remaining saved or printed and which person carried out these actions.
More recently, business corporations have used pc forensics to their gain in a range of instances such as:
- Intellectual Property theft
- Industrial espionage
- Employment disputes
- Fraud investigations
- Matrimonial issues
- Bankruptcy investigations
- Inappropriate e mail and net use in the work place
- Regulatory compliance
For proof to be admissible it ought to be dependable and now not prejudicial, that means that at all tiers of this procedure admissibility must be at the forefront of a pc forensic examiner’s mind. One set of tips which has been extensively commonplace to aid in this is the Association of Chief Police Officers Good Practice Guide for Computer Based Electronic Evidence or ACPO Guide for short. Although the ACPO Guide is aimed at United Kingdom regulation enforcement its major concepts are relevant to all laptop forensics in anything legislature. The 4 major ideas from this information have been reproduced under (with references to regulation enforcement removed):
No motion need to trade information held on a pc or storage media which may also be as a result relied upon in court. In situations the place a individual finds it crucial to get right of entry to authentic information held on a pc or storage media, that character have to be in a position to do so and be in a position to provide proof explaining the relevance and the implications of their actions.An audit path or different report of all procedures utilized to computer-based digital proof ought to be created and preserved. An unbiased third-party must be in a position to look at these tactics and reap the equal result. The individual in cost of the investigation has universal duty for making sure that the regulation and these ideas are adhered to. In summary, no modifications have to be made to the original, on the other hand if access/changes are quintessential the examiner ought to comprehend what they are doing and to report their actions.