

The process of obtaining data as evidence of a crime using electronic devices and using appropriate investigation procedures to capture the perpetrator by submitting the evidence in court is known as cyber forensics.
To ensure the findings are acceptable in court, cyber forensics requires specific tools, procedures, and strict adherence to evidence integrity, including chain of custody, hashing, secure storage, and thorough documentation.
Using mathematical formulas called hash functions, hashing is the process of creating a fixed-size output from a variable-size input. This method determines a data structure’s index or storage location for an item.
Digital evidence is gathered from computers, laptops,mobile devices,Hard Disk,Pen Drive and other devices to help fight cybercrimes and bring about justice.
In Database forensics,recoving information from databases and analyzing it.In email forensics retrieve and analyse contacts, messages and other data on an email platform.In mobile forensics recover and analyze informations from mobile devices, including contacts, messages, pictures, videos and audio files.In malware forensics, code is analyzed to find malicious software such as Trojan horses, ransomware, and viruses.
Cyber forensic experts can also recover and analyze data from computer’s RAM.Cloud forensics investigates cloud-based services and data that is kept on the cloud.Analyzing a functioning computer system to find ongoing malicious activity is known as live forensics.To look into security issues, network forensics relies on tracking and examining network traffic and log data.



