In addition to accessing active email messages, it is sometimes possible to retrieve emails that the user has deleted, as a copy may be stored on the server.
Data
There are many different types of computer data that can serve as evidence in an investigation. Computer files such as documents, programs and media items including images, audio and video may all be considered evidence depending on the investigation.These files may be found stored on personal computers, on machines such as Web servers, and on external storage devices such as flash drives, USB sticks and portable hard drives. The most readily available type of data evidence is that which is still in active use within a functioning operating system.
Archived Data
Data comprising forensic evidence may be stored in archived form. This can be kept within a functioning computer's internal storage, or on an external drive. Archived files can include virtually any type of data, including documents, programs and multimedia items.The process of archiving data normally involves compressing it in size and saving it in an archived format, such as ZIP, TAR or RAR. In order to access the data contained within such files, they must be decompressed by a compatible program. Decompression is typically not troublesome if a common format has been used.
Encrypted Data
In addition to being archived and possibly compressed, data evidence may be stored in an encrypted form. This occurs when a user has used a digital security utility. In a common scenario, the user encrypts a file with a digital signature, using a key that prevents the file from being accessed by anyone who is not in possession of the required decryption key.Digital forensics experts are continually developing ways to access data that has been encrypted using such techniques.
Deleted Data
Data that has been deleted by its user can often still be accessed. When a file is deleted on a standard operating system, it is typically still stored in some form, so that it can be accessed in case of accidental deletion.This principle is observed across many types of operating system, both on consumer computers and on advanced machines such as Web servers. This means that digital forensic examinations can often locate information that has been deleted from its original location. If data evidence has become corrupted, it may require complex processing to retrieve anything useful.
Related Links
The Computer Forensic Examination ProcessE-Evidence Information Center - Home
Deleted Files - Computer Evidence Computer Forensic Analyst - Computer Forensic Examination
No comments:
Post a Comment